{"id":"CVE-2018-13982","details":"Smarty_Security::isTrustedResourceDir() in Smarty before 3.1.33 is prone to a path traversal vulnerability due to insufficient template code sanitization. This allows attackers controlling the executed template code to bypass the trusted directory security restriction and read arbitrary files.","aliases":["GHSA-7gfx-wxfh-7rvm"],"modified":"2026-04-10T04:05:45.700197Z","published":"2018-09-18T21:29:02.247Z","related":["MGASA-2018-0403","MGASA-2022-0127"],"references":[{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2021/10/msg00015.html"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2021/04/msg00004.html"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2021/04/msg00014.html"},{"type":"FIX","url":"https://github.com/sbaresearch/advisories/tree/public/2018/SBA-ADV-20180420-01_Smarty_Path_Traversal"},{"type":"FIX","url":"https://github.com/smarty-php/smarty/commit/2e081a51b1effddb23f87952959139ac62654d50"},{"type":"FIX","url":"https://github.com/smarty-php/smarty/commit/8d21f38dc35c4cd6b31c2f23fc9b8e5adbc56dfe"},{"type":"FIX","url":"https://github.com/smarty-php/smarty/commit/bcedfd6b58bed4a7366336979ebaa5a240581531"},{"type":"FIX","url":"https://github.com/smarty-php/smarty/commit/c9dbe1d08c081912d02bd851d1d1b6388f6133d1"},{"type":"FIX","url":"https://github.com/smarty-php/smarty/commit/f9ca3c63d1250bb56b2bda609dcc9dd81f0065f8"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/smarty-php/smarty","events":[{"introduced":"0"},{"fixed":"dd55b23121e55a3b4f1af90a707a6c4e5969530f"},{"fixed":"2e081a51b1effddb23f87952959139ac62654d50"},{"fixed":"8d21f38dc35c4cd6b31c2f23fc9b8e5adbc56dfe"},{"fixed":"bcedfd6b58bed4a7366336979ebaa5a240581531"},{"fixed":"c9dbe1d08c081912d02bd851d1d1b6388f6133d1"},{"fixed":"f9ca3c63d1250bb56b2bda609dcc9dd81f0065f8"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"3.1.33"}]}}],"versions":["v2.6.24","v2.6.25","v2.6.26","v2.6.27","v2.6.28","v3.1.11","v3.1.12","v3.1.13","v3.1.14","v3.1.15","v3.1.16","v3.1.17","v3.1.18","v3.1.19","v3.1.20","v3.1.21","v3.1.23","v3.1.24","v3.1.25","v3.1.26","v3.1.27","v3.1.28","v3.1.29","v3.1.30","v3.1.31","v3.1.32"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-13982.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"9.0"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}]}