#VU45383 Input validation error in Smarty - CVE-2010-4722


| Updated: 2020-08-11

Vulnerability identifier: #VU45383

Vulnerability risk: High

CVSSv4.0: 8.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]

CVE-ID: CVE-2010-4722

CWE-ID: CWE-20

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
Smarty
Web applications / CMS

Vendor: smarty.php.net

Description

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

Unspecified vulnerability in the fetch plugin in Smarty before 3.0.2 has unknown impact and remote attack vectors.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Smarty: 1.0 b - 1.0, 1.1.0, 1.2.0 - 1.2.2, 1.3.0 - 1.3.2, 1.4.0 - 1.4.6, 1.5.0 - 1.5.2, 2.0.0 - 2.0.1, 2.1.0 - 2.1.1, 2.2.0, 2.3.0 - 2.3.1, 2.4.0 - 2.4.2, 2.5.0, 2.6.0 - 2.6.26, 3.0.0


External links
https://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability