Package "smarty3"
Name: |
smarty3
|
Description: |
Smarty - the compiling PHP template engine
|
Latest version: |
3.1.31+20161214.1.c7d42e4+selfpack1-3ubuntu0.1 |
Release: |
bionic (18.04) |
Level: |
security |
Repository: |
universe |
Homepage: |
http://www.smarty.net/ |
Links
Download "smarty3"
Other versions of "smarty3" in Bionic
Changelog
smarty3 (3.1.31+20161214.1.c7d42e4+selfpack1-3ubuntu0.1) bionic-security; urgency=medium
* SECURITY UPDATE: path traversal in Smarty templates
- debian/patches/CVE-2018-13982-1.patch: perform validation over
directory provided in libs/Smarty.class.php and
libs/sysplugins/smarty_security.php
- debian/patches/CVE-2018-13982-2.patch: reformat code of
previous patch and add additional checks.
- debian/patches/CVE-2018-13982-3.patch: alter regex validation
of previous patches and update logic flow.
- CVE-2018-13982
- CVE-2018-16831
* SECURITY UPDATE: execution of restricted php methods
- debian/patches/CVE-2021-21408.patch: Prevent evasion of the
static_classes security policy in
lexer/smarty_internal_templateparser.y and
libs/sysplugins/smarty_internal_templateparser.php.
- CVE-2021-21408
* SECURITY UPDATE: sandbox escape by accessing public object
- debian/patches/CVE-2021-26119.patch: Prevent access to
$smarty.template_object in sandbox mode in
libs/sysplugins/
smarty_internal_compile_private_special_variable.php.
- CVE-2021-26119
* SECURITY UPDATE: code injection through function name
- debian/patches/CVE-2021-26120.patch: perform validation over
the function name supplied in
libs/sysplugins/smarty_internal_compile_function.php.
- CVE-2021-26120
* SECURITY UPDATE: code injection through math function
- debian/patches/CVE-2021-29454.patch: verify if the input to
the math function is a mathematical expression in
libs/plugins/function.math.php.
- CVE-2021-29454
-- David Fernandez Gonzalez <email address hidden> Mon, 21 Mar 2022 12:21:04 +0100
|
CVE-2018-13982 |
Smarty_Security::isTrustedResourceDir() in Smarty before 3.1.33 is prone to a path traversal vulnerability due to insufficient template code sanitiza |
CVE-2018-16831 |
Smarty before 3.1.33-dev-4 allows attackers to bypass the trusted_dir protection mechanism via a file:./../ substring in an include statement. |
CVE-2021-21408 |
Smarty is a template engine for PHP, facilitating the separation of presentation (HTML/CSS) from application logic. Prior to versions 3.1.43 and 4.0. |
CVE-2021-26119 |
Smarty before 3.1.39 allows a Sandbox Escape because $smarty.template_object can be accessed in sandbox mode. |
CVE-2021-26120 |
Smarty before 3.1.39 allows code injection via an unexpected function name after a {function name= substring. |
CVE-2021-29454 |
Smarty is a template engine for PHP, facilitating the separation of presentation (HTML/CSS) from application logic. Prior to versions 3.1.42 and 4.0. |
|
About
-
Send Feedback to @ubuntu_updates