7.5
CVSSv2

CVE-2008-1066

Published: 28/02/2008 Updated: 08/08/2017
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

The modifier.regex_replace.php plugin in Smarty prior to 2.6.19, as used by Serendipity (S9Y) and other products, allows malicious users to call arbitrary PHP functions via templates, related to a '\0' character in a search string.

Vulnerable Product Search on Vulmon Subscribe to Product

smarty smarty

Vendor Advisories

It was discovered that the regex module in Smarty, a PHP templating engine, allows attackers to call arbitrary PHP functions via templates using the regex_replace plugin by a specially crafted search string For the old stable distribution (sarge), this problem has been fixed in version 269-1sarge1 For the stable distribution (etch), this proble ...