The smarty_function_math function in libs/plugins/function.math.php in Smarty 2.6.22 allows context-dependent attackers to execute arbitrary commands via shell metacharacters in the equation attribute of the math function.  NOTE: some of these details are obtained from third party information.
                
            References
                    Configurations
                    History
                    21 Nov 2024, 01:03
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://osvdb.org/54380 - | |
| References | () http://secunia.com/advisories/35072 - Vendor Advisory | |
| References | () http://secunia.com/advisories/35219 - | |
| References | () http://www.securityfocus.com/bid/34918 - Exploit | |
| References | () http://www.ubuntu.com/usn/usn-791-3 - | |
| References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/50457 - | |
| References | () https://www.exploit-db.com/exploits/8659 - | |
| References | () https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01274.html - | |
| References | () https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01283.html - | |
| References | () https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01287.html - | 
Information
                Published : 2009-05-18 18:30
Updated : 2025-04-09 00:30
NVD link : CVE-2009-1669
Mitre link : CVE-2009-1669
CVE.ORG link : CVE-2009-1669
JSON object : View
Products Affected
                smarty
- smarty
CWE
                
                    
                        
                        CWE-20
                        
            Improper Input Validation
