CVE-2008-1066

EUVD-2008-1077
The modifier.regex_replace.php plugin in Smarty before 2.6.19, as used by Serendipity (S9Y) and other products, allows attackers to call arbitrary PHP functions via templates, related to a '\0' character in a search string.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
7.5 UNKNOWN
NETWORK
LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
Base Score
CVSS 3.x
EPSS Score
Percentile: 79%
Affected Products (NVD)
VendorProductVersion
smartysmarty
𝑥
≤ 2.6.18
𝑥
= Vulnerable software versions
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
gallery2
dapper
ignored
feisty
ignored
gutsy
ignored
hardy
ignored
smarty
dapper
Fixed 2.6.11-1ubuntu0.1
released
edgy
Fixed 2.6.14-1ubuntu0.6.10.1
released
feisty
Fixed 2.6.14-1ubuntu0.7.04.1
released
gutsy
Fixed 2.6.18-1ubuntu2.1
released
References