Package: smarty Version: 2.6.22-1 Severity: normal Tags: security patch -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hi, the following CVE (Common Vulnerabilities & Exposures) id was published for smarty. CVE-2009-1669[0]: | The smarty_function_math function in libs/plugins/function.math.php in | Smarty 2.6.22 allows context-dependent attackers to execute arbitrary | commands via shell metacharacters in the equation attribute of the | math function. NOTE: some of these details are obtained from third | party information. With Windows you can launch commands like this: {math equation="`^C^A^L^C`"} ^C^A^L^C is equivalent to calc.exe, this isn''t true in Linux. However in Linux after putting an empty file with a command as name (''uptime'' for example): {math equation="`*u*`"} This will launch the "uptime" command. I doubt this can be considered an issue, to exploit it at least one file must be written and shell_exec() must not to be disabled. At this point writing a simple .php file with shell_exec(''whatever I want'') is equivalent and simplest... If you fix the vulnerability please also make sure to include the CVE id in your changelog entry. For further information see: [0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1669 http://security-tracker.debian.net/tracker/CVE-2009-1669 http://www.milw0rm.com/exploits/8659 Patch: http://groups.google.com/group/smarty-svn/browse_thread/thread/b2da2e5d1ef8b462 -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) iEYEARECAAYFAkoVhkUACgkQNxpp46476aowxQCfZxInNMa6dJXPEZ7dfpbUHD+3 5KcAn0eH02pLJkpg8IR4GlnowS5ZRww/ =ia44 -----END PGP SIGNATURE-----