It was discovered that Smarty incorrectly parsed blocks' names and included files' names. A remote attacker with template writing permissions could use this issue to execute arbitrary PHP code. (CVE-2022-29221)
{ "availability": "No subscription required", "binaries": [ { "binary_version": "3.1.39-2ubuntu1.22.04.1", "binary_name": "smarty3" } ] }