CVE-2022-29221Code Injection in Smarty

CWE-94Code Injection7 documents4 sources
Severity
8.8HIGHCNA
No vector
EPSS
25.5%
top 3.76%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 24
Latest updateDec 12

Description

PHP Code Injection by malicious block or filename in Smarty Smarty is a template engine for PHP, facilitating the separation of presentation (HTML/CSS) from application logic. Prior to versions 3.1.45 and 4.1.1, template authors could inject php code by choosing a malicious {block} name or {include} file name. Sites that cannot fully trust template authors should upgrade to versions 3.1.45 or 4.1.1 to receive a patch for this issue. There are currently no known workarounds.

Affected Packages3 packages

Packagistsmarty/smarty4.0.04.1.1+1
CVEListV5smarty-php/smarty< 3.1.45+1
Ubuntupostfixadmin/postfixadmin< 3.0.2-2ubuntu0.1~esm1+2

🔴Vulnerability Details

5
OSV
postfixadmin vulnerabilities2023-12-12
OSV
smarty3 vulnerability2023-04-13
OSV
PHP Code Injection by malicious block or filename in Smarty2022-05-25
GHSA
PHP Code Injection by malicious block or filename in Smarty2022-05-25
CVEList
PHP Code Injection by malicious block or filename in Smarty2022-05-24

📋Vendor Advisories

2
Ubuntu
PostfixAdmin vulnerabilities2023-12-12
Ubuntu
Smarty vulnerability2023-04-13