CVE-2022-29221

Severity CVSS v4.0:
Pending analysis
Type:
CWE-94 Code Injection
Publication date:
24/05/2022
Last modified:
07/11/2023

Description

Smarty is a template engine for PHP, facilitating the separation of presentation (HTML/CSS) from application logic. Prior to versions 3.1.45 and 4.1.1, template authors could inject php code by choosing a malicious {block} name or {include} file name. Sites that cannot fully trust template authors should upgrade to versions 3.1.45 or 4.1.1 to receive a patch for this issue. There are currently no known workarounds.

Vulnerable products and versions

CPE From Up to
cpe:2.3:a:smarty:smarty:*:*:*:*:*:*:*:* 3.1.45 (excluding)
cpe:2.3:a:smarty:smarty:*:*:*:*:*:*:*:* 4.0.0 (including) 4.1.1 (excluding)
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*