Lucene search

K
friendsofphpOpenJS FoundationFRIENDSOFPHP:SMARTY:SMARTY:CVE-2018-25047
HistorySep 14, 2022 - 11:32 a.m.

smarty_function_mailto - JavaScript injection in eval function

2022-09-1411:32:14
OpenJS Foundation
github.com
11
smarty
javascript
injection
remote exploitation
cross-site scripting

CVSS3

5.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

AI Score

6.9

Confidence

High

EPSS

0.002

Percentile

54.2%

I found a bug in the Smarty package, specifically in the smarty_function_mailto($params) function. Remote exploitation of such vulnerability is unlikely, but it is still advisable to take it into account. A web page that uses this function and that could be parameterized using GET or POST input parameters could cause the injection of JavaScript code of a malicious user and cause cross-site scripting attacks. Using the following code you can inject JavaScript code into the smarty_function_mailto function. =============================================================== $params = array( ‘encode’=>‘javascript’, ‘address’=>‘[email protected]">[email protected]’); alert(“- JavaScript Injected -”); //', ); echo smarty_function_mailto($params); =============================================================== The text was updated successfully, but these errors were encountered: All reactions

Affected configurations

Vulners
Node
smartysmartyRange<4.2.1
VendorProductVersionCPE
smartysmarty*cpe:2.3:a:smarty:smarty:*:*:*:*:*:*:*:*

CVSS3

5.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

AI Score

6.9

Confidence

High

EPSS

0.002

Percentile

54.2%