漏洞信息详情
New Digital Group Smarty 路径遍历漏洞
漏洞简介
New Digital Group Smarty是New Digital Group公司的一款使用PHP语言编写的模板引擎。
New Digital Group Smarty 3.1.33之前版本中的‘Smarty_Security::isTrustedResourceDir()’函数存在路径遍历漏洞,该漏洞源于程序对模板代码过滤不充分。攻击者可通过控制被执行的模板代码利用该漏洞绕过可信目录安全限制并读取任意文件。
漏洞公告
目前厂商已发布升级补丁以修复漏洞,补丁获取链接:
https://github.com/sbaresearch/advisories/tree/public/2018/SBA-ADV-20180420-01_Smarty_Path_Traversal
参考网址
来源:MISC
链接:https://github.com/sbaresearch/advisories/tree/public/2018/SBA-ADV-20180420-01_Smarty_Path_Traversal
来源:CONFIRM
链接:https://github.com/smarty-php/smarty/commit/2e081a51b1effddb23f87952959139ac62654d50
来源:CONFIRM
链接:https://github.com/smarty-php/smarty/commit/bcedfd6b58bed4a7366336979ebaa5a240581531
来源:MLIST
链接:https://lists.debian.org/debian-lts-announce/2021/04/msg00004.html
来源:CONFIRM
链接:https://github.com/smarty-php/smarty/commit/f9ca3c63d1250bb56b2bda609dcc9dd81f0065f8
来源:MLIST
链接:https://lists.debian.org/debian-lts-announce/2021/10/msg00015.html
来源:MLIST
链接:https://lists.debian.org/debian-lts-announce/2021/04/msg00014.html
来源:CONFIRM
链接:https://github.com/smarty-php/smarty/commit/c9dbe1d08c081912d02bd851d1d1b6388f6133d1
来源:CONFIRM
链接:https://github.com/smarty-php/smarty/commit/8d21f38dc35c4cd6b31c2f23fc9b8e5adbc56dfe
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.1142
来源:vigilance.fr
链接:https://vigilance.fr/vulnerability/Smarty-directory-traversal-via-Smarty-Security-isTrustedResourceDir-28668
受影响实体
- Smarty Smarty:3.1.11<!--2000-1-1-->
- Smarty Smarty:3.1.9<!--2000-1-1-->
- Smarty Smarty:3.1.10<!--2000-1-1-->
- Smarty Smarty:3.1.8<!--2000-1-1-->
- Smarty Smarty:3.1.7<!--2000-1-1-->
补丁
- New Digital Group Smarty 路径遍历漏洞的修复措施<!--2018-9-19-->
还没有评论,来说两句吧...