Vulnerability Name:
CVE-2008-4811 (CCN-46406)
Assigned:
2008-10-22
Published:
2008-10-22
Updated:
2017-08-08
Summary:
The _expand_quoted_text function in libs/Smarty_Compiler.class.php in Smarty 2.6.20 r2797 and earlier allows remote attackers to execute arbitrary PHP code via vectors related to templates and a \ (backslash) before a dollar-sign character.
CVSS v3 Severity:
7.3 High
(CCN CVSS v3.1 Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
)
Exploitability Metrics:
Attack Vector (AV):
Network
Attack Complexity (AC):
Low
Privileges Required (PR):
None
User Interaction (UI):
None
Scope:
Scope (S):
Unchanged
Impact Metrics:
Confidentiality (C):
Low
Integrity (I):
Low
Availibility (A):
Low
CVSS v2 Severity:
7.5 High
(CVSS v2 Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P
)
5.5 Medium
(Temporal CVSS v2 Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C
)
Exploitability Metrics:
Access Vector (AV):
Network
Access Complexity (AC):
Low
Authentication (Au):
None
Impact Metrics:
Confidentiality (C):
Partial
Integrity (I):
Partial
Availibility (A):
Partial
7.5 High
(CCN CVSS v2 Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P
)
5.5 Medium
(CCN Temporal CVSS v2 Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C
)
Exploitability Metrics:
Access Vector (AV):
Network
Access Complexity (AC):
Low
Athentication (Au):
None
Impact Metrics:
Confidentiality (C):
Partial
Integrity (I):
Partial
Availibility (A):
Partial
Vulnerability Type:
CWE-264
Vulnerability Consequences:
Gain Privileges
References:
Source: MITRE
Type: CNA
CVE-2008-4811
Source: CCN
Type: Mahara Web Site
Mahara 1.2.4, 1.1.8, and 1.0.14 Released
Source: CCN
Type: SA32329
Smarty "_expand_quoted_text()" Security Bypass Vulnerability
Source: SECUNIA
Type: Vendor Advisory
32329
Source: MISC
Type: UNKNOWN
http://securityvulns.ru/Udocument746.html
Source: DEBIAN
Type: UNKNOWN
DSA-1691
Source: DEBIAN
Type: DSA-1691
moodle -- several vulnerabilities
Source: CCN
Type: GLSA-201006-13
Smarty: Multiple vulnerabilities
Source: MLIST
Type: UNKNOWN
[oss-security] 20081025 Regarding SA32329 (Smarty "_expand_quoted_text()" Security Bypass)
Source: BID
Type: UNKNOWN
31862
Source: CCN
Type: BID-31862
Smarty Template Engine 'Smarty_Compiler.class.php' Security Bypass Vulnerability
Source: CCN
Type: Smarty Web site
Smarty: Template Engine
Source: CCN
Type: USN-791-1
Moodle vulnerabilities
Source: CCN
Type: Red Hat Bugzilla Bug 467317
Bug 467317 - Security Update for php-smarty
Source: XF
Type: UNKNOWN
smarty-expandquotedtext-code-execution1(46406)
Source: XF
Type: UNKNOWN
smarty-expandquotedtext-code-execution1(46406)
Vulnerable Configuration:
Configuration 1
:
cpe:/a:smarty:smarty:1.0:*:*:*:*:*:*:*
OR
cpe:/a:smarty:smarty:1.0a:*:*:*:*:*:*:*
OR
cpe:/a:smarty:smarty:1.0b:*:*:*:*:*:*:*
OR
cpe:/a:smarty:smarty:1.1.0:*:*:*:*:*:*:*
OR
cpe:/a:smarty:smarty:1.2.0:*:*:*:*:*:*:*
OR
cpe:/a:smarty:smarty:1.2.1:*:*:*:*:*:*:*
OR
cpe:/a:smarty:smarty:1.2.2:*:*:*:*:*:*:*
OR
cpe:/a:smarty:smarty:1.3.0:*:*:*:*:*:*:*
OR
cpe:/a:smarty:smarty:1.3.1:*:*:*:*:*:*:*
OR
cpe:/a:smarty:smarty:1.3.2:*:*:*:*:*:*:*
OR
cpe:/a:smarty:smarty:1.4.0:*:*:*:*:*:*:*
OR
cpe:/a:smarty:smarty:1.4.0:b1:*:*:*:*:*:*
OR
cpe:/a:smarty:smarty:1.4.0:b2:*:*:*:*:*:*
OR
cpe:/a:smarty:smarty:1.4.1:*:*:*:*:*:*:*
OR
cpe:/a:smarty:smarty:1.4.2:*:*:*:*:*:*:*
OR
cpe:/a:smarty:smarty:1.4.3:*:*:*:*:*:*:*
OR
cpe:/a:smarty:smarty:1.4.4:*:*:*:*:*:*:*
OR
cpe:/a:smarty:smarty:1.4.5:*:*:*:*:*:*:*
OR
cpe:/a:smarty:smarty:1.4.6:*:*:*:*:*:*:*
OR
cpe:/a:smarty:smarty:1.5.0:*:*:*:*:*:*:*
OR
cpe:/a:smarty:smarty:1.5.1:*:*:*:*:*:*:*
OR
cpe:/a:smarty:smarty:1.5.2:*:*:*:*:*:*:*
OR
cpe:/a:smarty:smarty:2.0.0:*:*:*:*:*:*:*
OR
cpe:/a:smarty:smarty:2.0.1:*:*:*:*:*:*:*
OR
cpe:/a:smarty:smarty:2.1.0:*:*:*:*:*:*:*
OR
cpe:/a:smarty:smarty:2.1.1:*:*:*:*:*:*:*
OR
cpe:/a:smarty:smarty:2.2.0:*:*:*:*:*:*:*
OR
cpe:/a:smarty:smarty:2.3.0:*:*:*:*:*:*:*
OR
cpe:/a:smarty:smarty:2.3.1:*:*:*:*:*:*:*
OR
cpe:/a:smarty:smarty:2.4.0:*:*:*:*:*:*:*
OR
cpe:/a:smarty:smarty:2.4.1:*:*:*:*:*:*:*
OR
cpe:/a:smarty:smarty:2.4.2:*:*:*:*:*:*:*
OR
cpe:/a:smarty:smarty:2.5.0:*:*:*:*:*:*:*
OR
cpe:/a:smarty:smarty:2.5.0:rc1:*:*:*:*:*:*
OR
cpe:/a:smarty:smarty:2.5.0:rc2:*:*:*:*:*:*
OR
cpe:/a:smarty:smarty:2.6.0:*:*:*:*:*:*:*
OR
cpe:/a:smarty:smarty:2.6.0:rc1:*:*:*:*:*:*
OR
cpe:/a:smarty:smarty:2.6.0:rc2:*:*:*:*:*:*
OR
cpe:/a:smarty:smarty:2.6.0:rc3:*:*:*:*:*:*
OR
cpe:/a:smarty:smarty:2.6.1:*:*:*:*:*:*:*
OR
cpe:/a:smarty:smarty:2.6.2:*:*:*:*:*:*:*
OR
cpe:/a:smarty:smarty:2.6.3:*:*:*:*:*:*:*
OR
cpe:/a:smarty:smarty:2.6.4:*:*:*:*:*:*:*
OR
cpe:/a:smarty:smarty:2.6.5:*:*:*:*:*:*:*
OR
cpe:/a:smarty:smarty:2.6.6:*:*:*:*:*:*:*
OR
cpe:/a:smarty:smarty:2.6.7:*:*:*:*:*:*:*
OR
cpe:/a:smarty:smarty:2.6.9:*:*:*:*:*:*:*
OR
cpe:/a:smarty:smarty:2.6.10:*:*:*:*:*:*:*
OR
cpe:/a:smarty:smarty:2.6.11:*:*:*:*:*:*:*
OR
cpe:/a:smarty:smarty:2.6.12:*:*:*:*:*:*:*
OR
cpe:/a:smarty:smarty:2.6.13:*:*:*:*:*:*:*
OR
cpe:/a:smarty:smarty:2.6.14:*:*:*:*:*:*:*
OR
cpe:/a:smarty:smarty:2.6.15:*:*:*:*:*:*:*
OR
cpe:/a:smarty:smarty:2.6.16:*:*:*:*:*:*:*
OR
cpe:/a:smarty:smarty:2.6.17:*:*:*:*:*:*:*
OR
cpe:/a:smarty:smarty:2.6.18:*:*:*:*:*:*:*
OR
cpe:/a:smarty:smarty:*:*:*:*:*:*:*:*
(Version <= 2.6.20)
Configuration CCN 1
:
cpe:/a:smarty:smarty:2.6.9:*:*:*:*:*:*:*
OR
cpe:/a:smarty:smarty:2.6.1:*:*:*:*:*:*:*
OR
cpe:/a:smarty:smarty:2.6.0:*:*:*:*:*:*:*
OR
cpe:/a:smarty:smarty:2.6.11:*:*:*:*:*:*:*
OR
cpe:/a:smarty:smarty:2.6.12:*:*:*:*:*:*:*
OR
cpe:/a:smarty:smarty:2.6.13:*:*:*:*:*:*:*
OR
cpe:/a:smarty:smarty:2.6.14:*:*:*:*:*:*:*
OR
cpe:/a:smarty:smarty:2.6.15:*:*:*:*:*:*:*
OR
cpe:/a:smarty:smarty:2.6.16:*:*:*:*:*:*:*
OR
cpe:/a:smarty:smarty:2.6.0:rc3:*:*:*:*:*:*
OR
cpe:/a:smarty:smarty:2.6.0:rc2:*:*:*:*:*:*
OR
cpe:/a:smarty:smarty:2.6.0:rc1:*:*:*:*:*:*
OR
cpe:/a:smarty:smarty:2.5.0:*:*:*:*:*:*:*
OR
cpe:/a:smarty:smarty:2.5.0:rc1:*:*:*:*:*:*
OR
cpe:/a:smarty:smarty:2.5.0:rc2:*:*:*:*:*:*
OR
cpe:/a:smarty:smarty:2.4.2:*:*:*:*:*:*:*
OR
cpe:/a:smarty:smarty:2.4.1:*:*:*:*:*:*:*
OR
cpe:/a:smarty:smarty:2.4.0:*:*:*:*:*:*:*
OR
cpe:/a:smarty:smarty:2.3.1:*:*:*:*:*:*:*
OR
cpe:/a:smarty:smarty:2.3.0:*:*:*:*:*:*:*
OR
cpe:/a:smarty:smarty:2.2.0:*:*:*:*:*:*:*
OR
cpe:/a:smarty:smarty:2.1.1:*:*:*:*:*:*:*
OR
cpe:/a:smarty:smarty:2.1.0:*:*:*:*:*:*:*
OR
cpe:/a:smarty:smarty:2.0.1:*:*:*:*:*:*:*
OR
cpe:/a:smarty:smarty:2.0.0:*:*:*:*:*:*:*
OR
cpe:/a:smarty:smarty:1.5.2:*:*:*:*:*:*:*
OR
cpe:/a:smarty:smarty:1.5.1:*:*:*:*:*:*:*
OR
cpe:/a:smarty:smarty:1.5.0:*:*:*:*:*:*:*
OR
cpe:/a:smarty:smarty:1.4.6:*:*:*:*:*:*:*
OR
cpe:/a:smarty:smarty:1.4.5:*:*:*:*:*:*:*
OR
cpe:/a:smarty:smarty:1.4.4:*:*:*:*:*:*:*
OR
cpe:/a:smarty:smarty:1.4.3:*:*:*:*:*:*:*
OR
cpe:/a:smarty:smarty:1.4.2:*:*:*:*:*:*:*
OR
cpe:/a:smarty:smarty:1.4.1:*:*:*:*:*:*:*
OR
cpe:/a:smarty:smarty:1.4.0:*:*:*:*:*:*:*
OR
cpe:/a:smarty:smarty:1.4.0:b1:*:*:*:*:*:*
OR
cpe:/a:smarty:smarty:1.4.0:b2:*:*:*:*:*:*
OR
cpe:/a:smarty:smarty:1.3.2:*:*:*:*:*:*:*
OR
cpe:/a:smarty:smarty:1.3.1:*:*:*:*:*:*:*
OR
cpe:/a:smarty:smarty:1.3.0:*:*:*:*:*:*:*
OR
cpe:/a:smarty:smarty:1.2.2:*:*:*:*:*:*:*
OR
cpe:/a:smarty:smarty:1.2.1:*:*:*:*:*:*:*
OR
cpe:/a:smarty:smarty:1.2.0:*:*:*:*:*:*:*
OR
cpe:/a:smarty:smarty:1.1.0:*:*:*:*:*:*:*
OR
cpe:/a:smarty:smarty:1.0b:*:*:*:*:*:*:*
OR
cpe:/a:smarty:smarty:1.0a:*:*:*:*:*:*:*
OR
cpe:/a:smarty:smarty:1.0:*:*:*:*:*:*:*
OR
cpe:/a:smarty:smarty:2.6.10:*:*:*:*:*:*:*
OR
cpe:/a:smarty:smarty:2.6.17:*:*:*:*:*:*:*
OR
cpe:/a:smarty:smarty:2.6.2:*:*:*:*:*:*:*
OR
cpe:/a:smarty:smarty:2.6.7:*:*:*:*:*:*:*
OR
cpe:/a:smarty:smarty:2.6.18:*:*:*:*:*:*:*
OR
cpe:/a:smarty:smarty:2.6.3:*:*:*:*:*:*:*
OR
cpe:/a:smarty:smarty:2.6.4:*:*:*:*:*:*:*
OR
cpe:/a:smarty:smarty:2.6.5:*:*:*:*:*:*:*
OR
cpe:/a:smarty:smarty:2.6.6:*:*:*:*:*:*:*
OR
cpe:/a:mahara:mahara:1.0.8:*:*:*:*:*:*:*
OR
cpe:/a:mahara:mahara:1.0.6:*:*:*:*:*:*:*
OR
cpe:/a:mahara:mahara:1.0.5:*:*:*:*:*:*:*
OR
cpe:/a:mahara:mahara:1.0.4:*:*:*:*:*:*:*
OR
cpe:/a:mahara:mahara:1.0.3:*:*:*:*:*:*:*
OR
cpe:/a:mahara:mahara:1.0.2:*:*:*:*:*:*:*
OR
cpe:/a:mahara:mahara:1.0.1:*:*:*:*:*:*:*
OR
cpe:/a:mahara:mahara:1.1.1:*:*:*:*:*:*:*
OR
cpe:/a:mahara:mahara:1.1.0:*:*:*:*:*:*:*
OR
cpe:/a:mahara:mahara:1.0.10:*:*:*:*:*:*:*
OR
cpe:/a:mahara:mahara:1.1.2:*:*:*:*:*:*:*
OR
cpe:/a:mahara:mahara:1.0.9:*:*:*:*:*:*:*
OR
cpe:/a:mahara:mahara:1.1.4:*:*:*:*:*:*:*
OR
cpe:/a:mahara:mahara:1.0.11:*:*:*:*:*:*:*
OR
cpe:/a:mahara:mahara:1.0.12:*:*:*:*:*:*:*
OR
cpe:/a:mahara:mahara:1.1.5:*:*:*:*:*:*:*
OR
cpe:/a:mahara:mahara:1.1.6:*:*:*:*:*:*:*
OR
cpe:/a:mahara:mahara:1.1.3:*:*:*:*:*:*:*
AND
cpe:/o:gentoo:linux:*:*:*:*:*:*:*:*
OR
cpe:/o:debian:debian_linux:4.0:*:*:*:*:*:*:*
OR
cpe:/o:canonical:ubuntu:8.04::lts:*:*:*:*:*
Denotes that component is vulnerable
Oval Definitions
Definition ID
Class
Title
Last Modified
oval:org.mitre.oval:def:13687
P
USN-791-1 -- moodle vulnerabilities
2014-07-07
oval:org.mitre.oval:def:7939
P
DSA-1691 moodle -- several vulnerabilities
2014-06-23
oval:org.mitre.oval:def:20060
P
DSA-1691-1 moodle - several vulnerabilities
2014-06-23
oval:org.debian:def:1691
V
several vulnerabilities
2008-12-22
BACK
smarty
smarty 1.0
smarty
smarty 1.0a
smarty
smarty 1.0b
smarty
smarty 1.1.0
smarty
smarty 1.2.0
smarty
smarty 1.2.1
smarty
smarty 1.2.2
smarty
smarty 1.3.0
smarty
smarty 1.3.1
smarty
smarty 1.3.2
smarty
smarty 1.4.0
smarty
smarty 1.4.0 b1
smarty
smarty 1.4.0 b2
smarty
smarty 1.4.1
smarty
smarty 1.4.2
smarty
smarty 1.4.3
smarty
smarty 1.4.4
smarty
smarty 1.4.5
smarty
smarty 1.4.6
smarty
smarty 1.5.0
smarty
smarty 1.5.1
smarty
smarty 1.5.2
smarty
smarty 2.0.0
smarty
smarty 2.0.1
smarty
smarty 2.1.0
smarty
smarty 2.1.1
smarty
smarty 2.2.0
smarty
smarty 2.3.0
smarty
smarty 2.3.1
smarty
smarty 2.4.0
smarty
smarty 2.4.1
smarty
smarty 2.4.2
smarty
smarty 2.5.0
smarty
smarty 2.5.0 rc1
smarty
smarty 2.5.0 rc2
smarty
smarty 2.6.0
smarty
smarty 2.6.0 rc1
smarty
smarty 2.6.0 rc2
smarty
smarty 2.6.0 rc3
smarty
smarty 2.6.1
smarty
smarty 2.6.2
smarty
smarty 2.6.3
smarty
smarty 2.6.4
smarty
smarty 2.6.5
smarty
smarty 2.6.6
smarty
smarty 2.6.7
smarty
smarty 2.6.9
smarty
smarty 2.6.10
smarty
smarty 2.6.11
smarty
smarty 2.6.12
smarty
smarty 2.6.13
smarty
smarty 2.6.14
smarty
smarty 2.6.15
smarty
smarty 2.6.16
smarty
smarty 2.6.17
smarty
smarty 2.6.18
smarty
smarty *
smarty
smarty 2.6.9
smarty
smarty 2.6.1
smarty
smarty 2.6.0
smarty
smarty 2.6.11
smarty
smarty 2.6.12
smarty
smarty 2.6.13
smarty
smarty 2.6.14
smarty
smarty 2.6.15
smarty
smarty 2.6.16
smarty
smarty 2.6.0 rc3
smarty
smarty 2.6.0 rc2
smarty
smarty 2.6.0 rc1
smarty
smarty 2.5.0
smarty
smarty 2.5.0 rc1
smarty
smarty 2.5.0 rc2
smarty
smarty 2.4.2
smarty
smarty 2.4.1
smarty
smarty 2.4.0
smarty
smarty 2.3.1
smarty
smarty 2.3.0
smarty
smarty 2.2.0
smarty
smarty 2.1.1
smarty
smarty 2.1.0
smarty
smarty 2.0.1
smarty
smarty 2.0.0
smarty
smarty 1.5.2
smarty
smarty 1.5.1
smarty
smarty 1.5.0
smarty
smarty 1.4.6
smarty
smarty 1.4.5
smarty
smarty 1.4.4
smarty
smarty 1.4.3
smarty
smarty 1.4.2
smarty
smarty 1.4.1
smarty
smarty 1.4.0
smarty
smarty 1.4.0 b1
smarty
smarty 1.4.0 b2
smarty
smarty 1.3.2
smarty
smarty 1.3.1
smarty
smarty 1.3.0
smarty
smarty 1.2.2
smarty
smarty 1.2.1
smarty
smarty 1.2.0
smarty
smarty 1.1.0
smarty
smarty 1.0b
smarty
smarty 1.0a
smarty
smarty 1.0
smarty
smarty 2.6.10
smarty
smarty 2.6.17
smarty
smarty 2.6.2
smarty
smarty 2.6.7
smarty
smarty 2.6.18
smarty
smarty 2.6.3
smarty
smarty 2.6.4
smarty
smarty 2.6.5
smarty
smarty 2.6.6
mahara
mahara 1.0.8
mahara
mahara 1.0.6
mahara
mahara 1.0.5
mahara
mahara 1.0.4
mahara
mahara 1.0.3
mahara
mahara 1.0.2
mahara
mahara 1.0.1
mahara
mahara 1.1.1
mahara
mahara 1.1.0
mahara
mahara 1.0.10
mahara
mahara 1.1.2
mahara
mahara 1.0.9
mahara
mahara 1.1.4
mahara
mahara 1.0.11
mahara
mahara 1.0.12
mahara
mahara 1.1.5
mahara
mahara 1.1.6
mahara
mahara 1.1.3
gentoo
linux *
debian
debian linux 4.0
canonical
ubuntu 8.04