Name | CVE-2008-4811 |
Description | The _expand_quoted_text function in libs/Smarty_Compiler.class.php in Smarty 2.6.20 r2797 and earlier allows remote attackers to execute arbitrary PHP code via vectors related to templates and a \ (backslash) before a dollar-sign character. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DSA-1691-1 |
Debian Bugs | 504328, 504345 |
The information below is based on the following data on fixed versions.
Notes
[lenny] - smarty <no-dsa> (Minor issue, fix will change behaviour)
[etch] - smarty <no-dsa> (Minor issue, fix will change behaviour)
This attack vector is *not* fixed in r2797