CVE-2008-1066
Severity CVSS v4.0:
Pending analysis
Type:
CWE-20
Input Validation
Publication date:
28/02/2008
Last modified:
09/04/2025
Description
The modifier.regex_replace.php plugin in Smarty before 2.6.19, as used by Serendipity (S9Y) and other products, allows attackers to call arbitrary PHP functions via templates, related to a '\0' character in a search string.
Impact
Base Score 2.0
7.50
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:smarty:smarty:*:*:*:*:*:*:*:* | 2.6.18 (including) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://blog.s9y.org/archives/191-Serendipity-1.3-beta1-released.html
- http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00008.html
- http://secunia.com/advisories/29241
- http://secunia.com/advisories/29392
- http://secunia.com/advisories/29398
- http://secunia.com/advisories/29405
- http://secunia.com/advisories/29562
- http://secunia.com/advisories/29839
- http://security.gentoo.org/glsa/glsa-201111-04.xml
- http://www.debian.org/security/2008/dsa-1520
- http://www.phpinsider.com/smarty-forum/viewtopic.php?p=47652
- http://www.securityfocus.com/bid/28105
- http://www.smarty.net/misc/NEWS
- https://exchange.xforce.ibmcloud.com/vulnerabilities/41002
- https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00298.html
- https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00358.html
- https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00551.html
- http://blog.s9y.org/archives/191-Serendipity-1.3-beta1-released.html
- http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00008.html
- http://secunia.com/advisories/29241
- http://secunia.com/advisories/29392
- http://secunia.com/advisories/29398
- http://secunia.com/advisories/29405
- http://secunia.com/advisories/29562
- http://secunia.com/advisories/29839
- http://security.gentoo.org/glsa/glsa-201111-04.xml
- http://www.debian.org/security/2008/dsa-1520
- http://www.phpinsider.com/smarty-forum/viewtopic.php?p=47652
- http://www.securityfocus.com/bid/28105
- http://www.smarty.net/misc/NEWS
- https://exchange.xforce.ibmcloud.com/vulnerabilities/41002
- https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00298.html
- https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00358.html
- https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00551.html



