SBA Security Advisory – Smarty – Trusted-Directory Bypass via Path Traversal (CVE-2018-13982)
Vulnerability Overview
Smarty 3.1.32 or below is prone to a path traversal vulnerability due to insufficient sanitization of code in Smarty templates. This allows attackers controlling the Smarty template to bypass the trusted directory security restriction and read arbitrary files.
- Type of Vulnerability: Path Traversal
- Fixed in Version: 3.1.33
- CVE ID: CVE-2018-13982
- CVSSv3 Vector: AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
- CVSSv3 Base Score: 8.6 (High)
Recommended Countermeasure
We recommend to update Smarty to version 3.1.33 or later. For further details, see the full security advisory.
Links
Credits
- David Lisa Gnedt (SBA Research)
- Thomas Konrad (SBA Research)