Smarty before 3.1.33-dev-4 allows attackers to bypass the trusted_dir protection mechanism via a file:./../ substring in an include statement.
{
"cpe": "cpe:2.3:a:smarty:smarty:*:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"introduced": "3.0.0"
},
{
"last_affected": "3.1.32"
}
]
}