You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Smarty is a template engine for PHP, facilitating the separation of presentation (HTML/CSS) from application logic. Prior to versions 3.1.42 and 4.0.2, template authors could run arbitrary PHP code by crafting a malicious math string. If a math string was passed through as user provided data to the math function, external users could run arbitrary PHP code by crafting a malicious math string. Users should upgrade to version 3.1.42 or 4.0.2 to receive a patch.
CVE-2021-29454 - High Severity Vulnerability
Vulnerable Library - smarty/smarty-v3.1.39
Smarty - the compiling PHP template engine
Library home page: https://api.github.com/repos/smarty-php/smarty/zipball/e27da524f7bcd7361e3ea5cdfa99c4378a7b5419
Dependency Hierarchy:
Found in HEAD commit: 86334f0df744f6cfa35a438987cbb4d18d65b5c2
Found in base branch: master
Vulnerability Details
Smarty is a template engine for PHP, facilitating the separation of presentation (HTML/CSS) from application logic. Prior to versions 3.1.42 and 4.0.2, template authors could run arbitrary PHP code by crafting a malicious math string. If a math string was passed through as user provided data to the math function, external users could run arbitrary PHP code by crafting a malicious math string. Users should upgrade to version 3.1.42 or 4.0.2 to receive a patch.
Publish Date: 2022-01-10
URL: CVE-2021-29454
CVSS 3 Score Details (8.1)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: GHSA-29gp-2c3m-3j6m
Release Date: 2022-01-10
Fix Resolution: v3.1.42,v4.0.2
The text was updated successfully, but these errors were encountered: