Lucene search

K
debianDebianDEBIAN:DLA-3262-1:9D56B
HistoryJan 05, 2023 - 9:00 p.m.

[SECURITY] [DLA 3262-1] smarty3 security update

2023-01-0521:00:54
lists.debian.org
9
smarty3
cross-site scripting
debian 10

CVSS3

5.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

AI Score

5.7

Confidence

High

EPSS

0.002

Percentile

54.2%


Debian LTS Advisory DLA-3262-1 [email protected]
https://www.debian.org/lts/security/ Chris Lamb
January 05, 2023 https://wiki.debian.org/LTS


Package : smarty3
Version : 3.1.33+20180830.1.3a78a21f+selfpack1-1+deb10u2
CVE ID : CVE-2018-25047
Debian Bug : 1019897

It was discovered that there was a potential cross-site scripting
vulnerability in smarty3, a widely-used PHP templating engine.

For Debian 10 buster, this problem has been fixed in version
3.1.33+20180830.1.3a78a21f+selfpack1-1+deb10u2.

We recommend that you upgrade your smarty3 packages.

For the detailed security status of smarty3 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/smarty3

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

OSVersionArchitecturePackageVersionFilename
Debian10allsmarty3< 3.1.33+20180830.1.3a78a21f+selfpack1-1+deb10u2smarty3_3.1.33+20180830.1.3a78a21f+selfpack1-1+deb10u2_all.deb

CVSS3

5.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

AI Score

5.7

Confidence

High

EPSS

0.002

Percentile

54.2%