[smarty] [CVE-2008-1066] arbitrary code execution

Bug #203457 reported by disabled.user
254
Affects Status Importance Assigned to Milestone
smarty (Debian)
Fix Released
Unknown
smarty (Ubuntu)
New
Undecided
Unassigned

Bug Description

Binary package hint: smarty

References:
DSA-1520-1 (http://www.debian.org/security/2008/dsa-1520)

Quoting:
"It was discovered that the regex module in Smarty, a PHP templating engine,
allows attackers to call arbitrary PHP functions via templates using the
regex_replace plugin by a specially crafted search string."

CVE References

Changed in smarty:
status: Unknown → Fix Released
To post a comment you must log in.
This report contains Public Security information  
Everyone can see this security related information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.