CVE-2024-35226: Smarty vulnerable to PHP Code Injection by malicious attribute in extends-tag
(updated )
Template authors could inject php code by choosing a malicous file name for an extends-tag. Users that cannot fully trust template authors should update asap.
References
- github.com/advisories/GHSA-4rmg-292m-wg3w
- github.com/smarty-php/smarty
- github.com/smarty-php/smarty/commit/0be92bc8a6fb83e6e0d883946f7e7c09ba4e857a
- github.com/smarty-php/smarty/security/advisories/GHSA-4rmg-292m-wg3w
- lists.debian.org/debian-lts-announce/2024/11/msg00013.html
- nvd.nist.gov/vuln/detail/CVE-2024-35226
Code Behaviors & Features
Detect and mitigate CVE-2024-35226 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →