10
CVSSv2

CVE-2009-1669

Published: 18/05/2009 Updated: 29/09/2017
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
VMScore: 1000
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

The smarty_function_math function in libs/plugins/function.math.php in Smarty 2.6.22 allows context-dependent malicious users to execute arbitrary commands via shell metacharacters in the equation attribute of the math function. NOTE: some of these details are obtained from third party information.

Vulnerable Product Search on Vulmon Subscribe to Product

smarty smarty 2.6.22

Vendor Advisories

It was discovered that Smarty did not correctly filter certain math inputs A remote attacker using Smarty via a web service could exploit this to execute subsets of shell commands as the web server user ...
Thor Larholm discovered that PHPMailer, as used by Moodle, did not correctly escape email addresses A local attacker with direct access to the Moodle database could exploit this to execute arbitrary commands as the web server user (CVE-2007-3215) ...
Several remote vulnerabilities have been discovered in Smarty, a PHP templating engine The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2008-4810 The _expand_quoted_text function allows for certain restrictions in templates, like function calling and PHP execution, to be bypassed CVE-2009-1669 The sma ...

Exploits

<?php /* Bitweaver <= 26 /boards/boards_rssphp / saveFeed() remote code execution exploit by Nine:Situations:Group::bookoo phpini independent site: retrogodaltervistaorg/ software site: wwwbitweaverorg/ You need an user account and you need to change your "display name" in: ...