Search CVE reports
1 – 10 of 14 results
Some fixes available 7 of 11
Smarty is a template engine for PHP, facilitating the separation of presentation (HTML/CSS) from application logic. In affected versions template authors could inject php code by choosing a malicious file name for an extends-tag....
2 affected packages
smarty3, smarty4
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
smarty3 | Fixed | Fixed | Fixed | Fixed |
smarty4 | Fixed | Not in release | Not in release | — |
Some fixes available 8 of 27
Smarty is a template engine for PHP. In affected versions smarty did not properly escape javascript code. An attacker could exploit this vulnerability to execute arbitrary JavaScript code in the context of the user's browser...
4 affected packages
civicrm, smarty3, smarty4, postfixadmin
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
civicrm | Not in release | Needs evaluation | Needs evaluation | Needs evaluation |
smarty3 | Fixed | Fixed | Fixed | Fixed |
smarty4 | Not affected | Not in release | Not in release | Not in release |
postfixadmin | Vulnerable | Fixed | Fixed | Fixed |
Some fixes available 10 of 32
Smarty is a template engine for PHP, facilitating the separation of presentation (HTML/CSS) from application logic. Prior to versions 3.1.45 and 4.1.1, template authors could inject php code by choosing a malicious {block} name or...
6 affected packages
postfixadmin, smarty4, collabtive, galette, gosa, smarty3
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
postfixadmin | Not affected | Fixed | Fixed | Fixed |
smarty4 | Not affected | — | — | — |
collabtive | — | — | — | — |
galette | — | — | — | — |
gosa | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation |
smarty3 | Fixed | Fixed | Needs evaluation | Needs evaluation |
Some fixes available 11 of 12
Smarty is a template engine for PHP, facilitating the separation of presentation (HTML/CSS) from application logic. Prior to versions 3.1.42 and 4.0.2, template authors could run arbitrary PHP code by crafting a malicious math...
1 affected package
smarty3
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
smarty3 | Fixed | Fixed | Fixed | Fixed |
Some fixes available 3 of 5
Smarty before 3.1.39 allows code injection via an unexpected function name after a {function name= substring.
1 affected package
smarty3
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
smarty3 | Not affected | Not affected | Fixed | Fixed |
Some fixes available 3 of 5
Smarty before 3.1.39 allows a Sandbox Escape because $smarty.template_object can be accessed in sandbox mode.
1 affected package
smarty3
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
smarty3 | Not affected | Not affected | Fixed | Fixed |
Some fixes available 11 of 12
Smarty is a template engine for PHP, facilitating the separation of presentation (HTML/CSS) from application logic. Prior to versions 3.1.43 and 4.0.3, template authors could run restricted static php methods. Users should upgrade...
1 affected package
smarty3
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
smarty3 | Fixed | Fixed | Fixed | Fixed |
Some fixes available 5 of 13
In Smarty before 3.1.47 and 4.x before 4.2.1, libs/plugins/function.mailto.php allows XSS. A web page that uses smarty_function_mailto, and that could be parameterized using GET or POST input parameters, could allow injection of...
2 affected packages
smarty3, smarty4
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
smarty3 | Fixed | Fixed | Fixed | Fixed |
smarty4 | Not affected | Not in release | Not in release | Not in release |
Some fixes available 1 of 2
Smarty before 3.1.33-dev-4 allows attackers to bypass the trusted_dir protection mechanism via a file:./../ substring in an include statement.
1 affected package
smarty3
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
smarty3 | — | Not affected | Not affected | Fixed |
Some fixes available 1 of 2
Smarty_Security::isTrustedResourceDir() in Smarty before 3.1.33 is prone to a path traversal vulnerability due to insufficient template code sanitization. This allows attackers controlling the executed template code to bypass the...
1 affected package
smarty3
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
smarty3 | — | Not affected | Not affected | Fixed |