CVE-2014-8350
Severity CVSS v4.0:
Pending analysis
Type:
CWE-94
Code Injection
Publication date:
03/11/2014
Last modified:
12/04/2025
Description
Smarty before 3.1.21 allows remote attackers to bypass the secure mode restrictions and execute arbitrary PHP code as demonstrated by "{literal}" in a template.
Impact
Base Score 2.0
7.50
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:smarty:smarty:*:*:*:*:*:*:*:* | 3.1.20 (including) | |
| cpe:2.3:a:smarty:smarty:1.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:smarty:smarty:1.0a:*:*:*:*:*:*:* | ||
| cpe:2.3:a:smarty:smarty:1.0b:*:*:*:*:*:*:* | ||
| cpe:2.3:a:smarty:smarty:1.1.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:smarty:smarty:1.2.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:smarty:smarty:1.2.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:smarty:smarty:1.2.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:smarty:smarty:1.3.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:smarty:smarty:1.3.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:smarty:smarty:1.3.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:smarty:smarty:1.4.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:smarty:smarty:1.4.0:b1:*:*:*:*:*:* | ||
| cpe:2.3:a:smarty:smarty:1.4.0:b2:*:*:*:*:*:* | ||
| cpe:2.3:a:smarty:smarty:1.4.1:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://advisories.mageia.org/MGASA-2014-0468.html
- http://seclists.org/oss-sec/2014/q4/420
- http://seclists.org/oss-sec/2014/q4/421
- http://www.mandriva.com/security/advisories?name=MDVSA-2014%3A221
- http://www.securityfocus.com/bid/70708
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=765920
- https://code.google.com/p/smarty-php/source/browse/trunk/distribution/change_log.txt?r=4902
- https://exchange.xforce.ibmcloud.com/vulnerabilities/97725
- http://advisories.mageia.org/MGASA-2014-0468.html
- http://seclists.org/oss-sec/2014/q4/420
- http://seclists.org/oss-sec/2014/q4/421
- http://www.mandriva.com/security/advisories?name=MDVSA-2014%3A221
- http://www.securityfocus.com/bid/70708
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=765920
- https://code.google.com/p/smarty-php/source/browse/trunk/distribution/change_log.txt?r=4902
- https://exchange.xforce.ibmcloud.com/vulnerabilities/97725



