Miggo Logo

CVE-2017-1000480: Smarty PHP code injection

9.8

CVSS Score
3.0

Basic Information

EPSS Score
0.74799%
Published
5/14/2022
Updated
4/24/2024
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
smarty/smartycomposer>= 3, < 3.1.323.1.32

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability description explicitly states that fetch() and display() are vulnerable when used with custom resources that lack template name sanitization. These functions are core Smarty methods responsible for rendering templates. The CWE-94 classification confirms code injection occurs via improper input control in template handling. Multiple advisories (GitHub, NVD, Debian) consistently reference these functions in the exploit context, and the patch in v3.1.32 would address their input validation logic for custom resources.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

Sm*rty * ***or* *.*.** is vuln*r**l* to * P*P *o** inj**tion w**n **llin* **t**() or *ispl*y() *un*tions on *ustom r*sour**s t**t *o*s not s*nitiz* t*mpl*t* n*m*.

Reasoning

T** vuln*r**ility **s*ription *xpli*itly st*t*s t**t `**t**()` *n* `*ispl*y()` *r* vuln*r**l* w**n us** wit* *ustom r*sour**s t**t l**k t*mpl*t* n*m* s*nitiz*tion. T**s* *un*tions *r* *or* Sm*rty m*t*o*s r*sponsi*l* *or r*n**rin* t*mpl*t*s. T** *W*-*