The modifier.regex_replace.php plugin in Smarty before 2.6.19, as used by Serendipity (S9Y) and other products, allows attackers to call arbitrary PHP functions via templates, related to a '\0' character in a search string.
References
Configurations
History
No history.
Information
Published : 2008-02-28 20:44
Updated : 2017-08-08 01:29
NVD link : CVE-2008-1066
Mitre link : CVE-2008-1066
CVE.ORG link : CVE-2008-1066
JSON object : View
Products Affected
smarty
- smarty
CWE
CWE-20
Improper Input Validation