Permissions, Privileges, and Access Controls in smarty.php.net Smarty



Published: 2011-02-03 | Updated: 2020-08-11
Risk Medium
Patch available YES
Number of vulnerabilities 1
CVE ID CVE-2009-5054
CWE ID CWE-264
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
Smarty
Web applications / CMS

Vendor smarty.php.net

Security Advisory

This security advisory describes one medium risk vulnerability.

1) Permissions, Privileges, and Access Controls

Risk: Medium

CVSSv3.1: 6.4 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C] [PCI]

CVE-ID: CVE-2009-5054

CWE-ID: CWE-264 - Permissions, Privileges, and Access Controls

Exploit availability: No

Description

The vulnerability allows a remote non-authenticated attacker to read and manipulate data.

Smarty before 3.0.0 beta 4 does not consider the umask value when setting the permissions of files, which might allow attackers to bypass intended access restrictions via standard filesystem operations.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Smarty: 1.0, 1.0 b, 1.0a, 1.1.0, 1.2.0, 1.2.1, 1.2.2, 1.3.0, 1.3.1, 1.3.2, 1.4.0, 1.4.1, 1.4.2, 1.4.3, 1.4.4, 1.4.5, 1.4.6, 1.5.0, 1.5.1, 1.5.2, 2.0.0, 2.0.1, 2.1.0, 2.1.1, 2.2.0, 2.3.0, 2.3.1, 2.4.0, 2.4.1, 2.4.2, 2.5.0, 2.6.0, 2.6.1, 2.6.2, 2.6.3, 2.6.4, 2.6.5, 2.6.6, 2.6.7, 2.6.9, 2.6.10, 2.6.11, 2.6.12, 2.6.13, 2.6.14, 2.6.15, 2.6.16, 2.6.17, 2.6.18, 2.6.20, 2.6.22, 2.6.24, 2.6.25

CPE External links

http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt

Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###