7.5

CVE-2014-8350

Exploit

Smarty before 3.1.21 allows remote attackers to bypass the secure mode restrictions and execute arbitrary PHP code as demonstrated by "{literal}<{/literal}script language=php>" in a template.

Data is provided by the National Vulnerability Database (NVD)
SmartySmarty Version <= 3.1.20
SmartySmarty Version1.0
SmartySmarty Version1.0a
SmartySmarty Version1.0b
SmartySmarty Version1.1.0
SmartySmarty Version1.2.0
SmartySmarty Version1.2.1
SmartySmarty Version1.2.2
SmartySmarty Version1.3.0
SmartySmarty Version1.3.1
SmartySmarty Version1.3.2
SmartySmarty Version1.4.0
SmartySmarty Version1.4.0 Updateb1
SmartySmarty Version1.4.0 Updateb2
SmartySmarty Version1.4.1
SmartySmarty Version1.4.2
SmartySmarty Version1.4.3
SmartySmarty Version1.4.4
SmartySmarty Version1.4.5
SmartySmarty Version1.4.6
SmartySmarty Version1.5.0
SmartySmarty Version1.5.1
SmartySmarty Version1.5.2
SmartySmarty Version2.0.0
SmartySmarty Version2.0.1
SmartySmarty Version2.1.0
SmartySmarty Version2.1.1
SmartySmarty Version2.2.0
SmartySmarty Version2.3.0
SmartySmarty Version2.3.1
SmartySmarty Version2.4.0
SmartySmarty Version2.4.1
SmartySmarty Version2.4.2
SmartySmarty Version2.5.0
SmartySmarty Version2.5.0 Updaterc1
SmartySmarty Version2.5.0 Updaterc2
SmartySmarty Version2.6.0
SmartySmarty Version2.6.0 Updaterc1
SmartySmarty Version2.6.0 Updaterc2
SmartySmarty Version2.6.0 Updaterc3
SmartySmarty Version2.6.1
SmartySmarty Version2.6.2
SmartySmarty Version2.6.3
SmartySmarty Version2.6.4
SmartySmarty Version2.6.5
SmartySmarty Version2.6.6
SmartySmarty Version2.6.7
SmartySmarty Version2.6.9
SmartySmarty Version2.6.10
SmartySmarty Version2.6.11
SmartySmarty Version2.6.12
SmartySmarty Version2.6.13
SmartySmarty Version2.6.14
SmartySmarty Version2.6.15
SmartySmarty Version2.6.16
SmartySmarty Version2.6.17
SmartySmarty Version2.6.18
SmartySmarty Version2.6.20
SmartySmarty Version2.6.22
SmartySmarty Version2.6.24
SmartySmarty Version2.6.25
SmartySmarty Version2.6.26
SmartySmarty Version3.0.0
SmartySmarty Version3.0.0 Updatebeta4
SmartySmarty Version3.0.0 Updatebeta5
SmartySmarty Version3.0.0 Updatebeta6
SmartySmarty Version3.0.0 Updatebeta7
SmartySmarty Version3.0.0 Updatebeta8
SmartySmarty Version3.0.0 Updaterc1
SmartySmarty Version3.0.0 Updaterc2
SmartySmarty Version3.0.0 Updaterc3
SmartySmarty Version3.0.0 Updaterc4
SmartySmarty Version3.0.1
SmartySmarty Version3.0.2
SmartySmarty Version3.0.3
SmartySmarty Version3.0.4
SmartySmarty Version3.0.5
SmartySmarty Version3.0.6
SmartySmarty Version3.0.7
SmartySmarty Version3.1 Updaterc1
SmartySmarty Version3.1.0
SmartySmarty Version3.1.1
SmartySmarty Version3.1.2
SmartySmarty Version3.1.3
SmartySmarty Version3.1.4
SmartySmarty Version3.1.5
SmartySmarty Version3.1.6
SmartySmarty Version3.1.7
SmartySmarty Version3.1.8
SmartySmarty Version3.1.9
SmartySmarty Version3.1.10
SmartySmarty Version3.1.11
SmartySmarty Version3.1.12
SmartySmarty Version3.1.13
SmartySmarty Version3.1.14
SmartySmarty Version3.1.15
SmartySmarty Version3.1.16
SmartySmarty Version3.1.17
SmartySmarty Version3.1.18
SmartySmarty Version3.1.19
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.47% 0.62
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 7.5 10 6.4
AV:N/AC:L/Au:N/C:P/I:P/A:P
CWE-94 Improper Control of Generation of Code ('Code Injection')

The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.