Smarty before 3.1.33-dev-4 allows attackers to bypass the trusted_dir protection mechanism via a file:./../ substring in an include statement.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "3.1.31+20161214.1.c7d42e4+selfpack1-3ubuntu0.1", "binary_name": "smarty3" } ] }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "3.1.33+20180830.1.3a78a21f+selfpack1-1", "binary_name": "smarty3" } ] }