| Summary: | php-smarty new security issue CVE-2018-25047 | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | David Walser <luigiwalser> |
| Component: | Security | Assignee: | QA Team <qa-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | Sec team <security> |
| Severity: | normal | ||
| Priority: | Normal | CC: | andrewsfarm, davidwhodgins, herman.viaene, mageia, sysadmin-bugs |
| Version: | 8 | Keywords: | advisory, validated_update |
| Target Milestone: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | MGA8-64-OK | ||
| Source RPM: | php-smarty-4.1.1-1.mga8.src.rpm | CVE: | CVE-2018-25047 |
| Status comment: | |||
|
Description
David Walser
2023-01-10 14:36:58 CET
David Walser
2023-01-10 14:37:06 CET
Status comment:
(none) =>
Fixed upstream in 4.2.1
Marc Krämer
2023-01-11 06:07:28 CET
CVE:
(none) =>
CVE-2018-25047 It was discovered that there was a potential cross-site scripting vulnerability in smarty3, a widely-used PHP templating engine. In Smarty before 3.1.47 and 4.x before 4.2.1, libs/plugins/function.mailto.php allows XSS. A web page that uses smarty_function_mailto, and that could be parameterized using GET or POST input parameters, could allow injection of JavaScript code by a user. References: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25047 https://www.debian.org/lts/security/2023/dla-3262 https://github.com/smarty-php/smarty/releases/tag/v4.2.1 Updates in core/updates_testing: php-smarty-4.2.1-1.mga8.noarch.rpm SRPM: php-smarty-4.2.1-1.mga8.src.rpm Assignee:
mageia =>
qa-bugs
David Walser
2023-01-11 08:28:12 CET
Status comment:
Fixed upstream in 4.2.1 =>
(none) MGA8-64 MATE on Acer Aspire 5253 No installation issues. As in previoous updates, OK on clean install. CC:
(none) =>
herman.viaene Validating. Advisory in Comment 1. Keywords:
(none) =>
validated_update
Dave Hodgins
2023-01-24 01:42:56 CET
CC:
(none) =>
davidwhodgins An update for this issue has been pushed to the Mageia Updates repository. https://advisories.mageia.org/MGASA-2023-0014.html Status:
NEW =>
RESOLVED |