QID 198715
Date Published: 2022-03-29
QID 198715: Ubuntu Security Notification for Smarty Vulnerabilities (USN-5348-1)
Smarty was incorrectlysanitizing the paths present in the templates.
Smarty was incorrectly sanitizing the pathspresent in the templates.
Smarty was incorrectly validating security policydata, allowing the execution of static classes even when not permitted bythe security settings.
Smarty was incorrectly managing access control totemplate objects, which allowed users to perform a sandbox escape.
Smarty was not checking for special characterswhen setting function names during plugin compile operations.
Smarty was incorrectly sanitizing characters inmath strings processed by the math function.
An attacker could possiblyuse this use to read arbitrary files when controlling the executedtemplate.
An attacker could possibly use this use to readarbitrary files when controlling the executed template.
An attacker could possibly use this issue toexecute arbitrary code.
Anattacker could possibly use this issue to send specially crafted input toapplications that use smarty and execute arbitrary code.
An attackercould possibly use this issue to send specially crafted input toapplications that use smarty and execute arbitrary code.
An attacker could possiblyuse this issue to send specially crafted input to applications that usesmarty and execute arbitrary code.
- USN-5348-1 -
ubuntu.com/security/notices/USN-5348-1
CVEs related to QID 198715
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| USN-5348-1 | Ubuntu Linux |
|