SB2019022222 - Fedora 28 update for php-Smarty
Published: February 22, 2019 Updated: April 24, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 3 secuirty vulnerabilities.
1) PHP file inclusion (CVE-ID: CVE-2018-16831)
The vulnerability allows a remote attacker to include and execute arbitrary PHP files on the server.
The vulnerability exists due to incorrect input validation when including PHP files. A remote non-authenticated attacker can send a specially crafted HTTP request to the affected application, bypass the trusted_dir protection mechanism via a file:./../ substring in an include statemen, include and execute arbitrary PHP code on the system with privileges of the web server.
2) PHP code injection (CVE-ID: CVE-2017-1000480)
The vulnerability allows a remote attacker to execute arbitrary PHP code on the target system.The weakness exists due to insufficient sanitization of template name by calling fetch() or display() functions on custom resources. A remote attacker can send a specially file, inject and execute PHP code with elevated privileges.
3) Path traversal (CVE-ID: CVE-2018-13982)
The vulnerability allows a remote attacker to perform directory traversal attacks.
The vulnerability exists due to input validation error when processing directory traversal sequences in Smarty_Security::isTrustedResourceDir(). A remote attacker can send a specially crafted HTTP request and read arbitrary files on the system.
Remediation
Install update from vendor's website.