Smarty before 3.1.33-dev-4 allows attackers to bypass the trusted_dir protection mechanism via a file:./../ substring in an include statement.
{ "binaries": [ { "binary_version": "3.1.31+20161214.1.c7d42e4+selfpack1-3ubuntu0.1", "binary_name": "smarty3" } ], "availability": "No subscription required" }
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2018/UBUNTU-CVE-2018-16831.json"