ELA-1237-1 smarty3 security update

Multiple vulnerabilties

2024-11-17
Packagesmarty3
Version3.1.33+20180830.1.3a78a21f+selfpack1-1+deb10u3 (buster)
Related CVEs CVE-2018-25047 CVE-2023-28447 CVE-2024-35226


Multiple vulnerabilties were discovered for smarty3, a widely-used PHP templating engine, which potentially allows an attacker to perform an XSS (e.g JavaScript or PHP code injection).

CVE-2018-25047

In Smarty before 3.1.47 and 4.x before 4.2.1,
libs/plugins/function.mailto.php allows XSS. A web page that uses
smarty_function_mailto, and that could be parameterized using GET or
POST input parameters, could allow injection of JavaScript code by a
user.

CVE-2018-25047 had already been reported as fixed previously via DLA-3262-1, however it was found the fix was incomplete.

CVE-2023-28447

In affected versions smarty did not properly escape javascript code.
An attacker could exploit this vulnerability to execute arbitrary
JavaScript code in the context of the user's browser session. This
may lead to unauthorized access to sensitive user data, manipulation
of the web application's behavior, or unauthorized actions performed
on behalf of the user. Users are advised to upgrade to either
version 3.1.48 or to 4.3.1 to resolve this issue. There are no known
workarounds for this vulnerability.

CVE-2024-35226

In affected versions template authors could inject php code by
choosing a malicious file name for an extends-tag. Sites that cannot
fully trust template authors should update asap. All users are
advised to update.  There is no patch for users on the v3 branch.
There are no known workarounds for this vulnerability.


For Debian 10 buster, these problems have been fixed in version 3.1.33+20180830.1.3a78a21f+selfpack1-1+deb10u3.

We recommend that you upgrade your smarty3 packages.

Further information about Extended LTS security advisories can be found in the dedicated section of our website.