DescriptionSmarty_Security::isTrustedResourceDir() in Smarty before 3.1.33 is prone to a path traversal vulnerability due to insufficient template code sanitization. This allows attackers controlling the executed template code to bypass the trusted directory security restriction and read arbitrary files.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severitymedium (attack range: remote)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
smarty3 (PTS)jessie (security), jessie3.1.21-1+deb8u2fixed
stretch (security), stretch3.1.31+20161214.1.c7d42e4+selfpack1-2+deb9u1vulnerable
buster, sid3.1.33+20180830.1.3a78a21f+selfpack1-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
smarty3sourcejessie(not affected)


[jessie] - smarty3 <not-affected> (vulnerable code not present)
CVE is about the fetch tag as an attack vector.
vulnerable code introduced in realpath() rewrite (c09b05cbe) released in 3.1.28

Search for package or bug name: Reporting problems