GHSA-65j5-vpm7-6xp4

Suggest an improvement
Source
https://github.com/advisories/GHSA-65j5-vpm7-6xp4
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-65j5-vpm7-6xp4/GHSA-65j5-vpm7-6xp4.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-65j5-vpm7-6xp4
Aliases
Published
2022-05-14T01:58:46Z
Modified
2024-02-16T08:16:34.740625Z
Severity
  • 5.9 (Medium) CVSS_V3 - CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
Smarty Path Traversal Vulnerability
Details

Smarty before 3.1.33-dev-4 allows attackers to bypass the trusted_dir protection mechanism via a file:./../ substring in an include statement.

References

Affected packages

Packagist / smarty/smarty

Package

Name
smarty/smarty
Purl
pkg:composer/smarty/smarty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.1.33

Affected versions

v2.*

v2.6.24
v2.6.25
v2.6.26
v2.6.27
v2.6.28
v2.6.29
v2.6.30
v2.6.31
v2.6.33

v3.*

v3.1.11
v3.1.12
v3.1.13
v3.1.14
v3.1.15
v3.1.16
v3.1.17
v3.1.18
v3.1.19
v3.1.20
v3.1.21
v3.1.23
v3.1.24
v3.1.25
v3.1.26
v3.1.27
v3.1.28
v3.1.29
v3.1.30
v3.1.31
v3.1.32