Smarty is a template engine for PHP, facilitating the separation of presentation (HTML/CSS) from application logic. Prior to versions 3.1.42 and 4.0.2, template authors could run arbitrary PHP code by crafting a malicious math string. If a math string was passed through as user provided data to the math function, external users could run arbitrary PHP code by crafting a malicious math string. Users should upgrade to version 3.1.42 or 4.0.2 to receive a patch.
CVE-2021-29454 - High Severity Vulnerability
Vulnerable Library - smarty/smarty-v3.1.39
Smarty - the compiling PHP template engine
Library home page: https://api.github.com/repos/smarty-php/smarty/zipball/e27da524f7bcd7361e3ea5cdfa99c4378a7b5419
Dependency Hierarchy: - :x: **smarty/smarty-v3.1.39** (Vulnerable Library)
Found in HEAD commit: 86334f0df744f6cfa35a438987cbb4d18d65b5c2
Found in base branch: master
Vulnerability Details
Smarty is a template engine for PHP, facilitating the separation of presentation (HTML/CSS) from application logic. Prior to versions 3.1.42 and 4.0.2, template authors could run arbitrary PHP code by crafting a malicious math string. If a math string was passed through as user provided data to the math function, external users could run arbitrary PHP code by crafting a malicious math string. Users should upgrade to version 3.1.42 or 4.0.2 to receive a patch.
Publish Date: 2022-01-10
URL: CVE-2021-29454
CVSS 3 Score Details (8.1)
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: None
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: https://github.com/smarty-php/smarty/security/advisories/GHSA-29gp-2c3m-3j6m
Release Date: 2022-01-10
Fix Resolution: v3.1.42,v4.0.2