Smarty (aka smarty-php) is vulnerable to cross-site scripting (XSS) attacks. The attacks exist because it does not properly handle the exception messages in SmartyException
class.
CPE | Name | Operator | Version |
---|---|---|---|
smarty/smarty | eq | 3.1.11 | |
smarty/smarty | le | 2.6.26 |
advisories.mageia.org/MGASA-2014-0468.html
code.google.com/p/smarty-php/source/browse/trunk/distribution/change_log.txt
code.google.com/p/smarty-php/source/detail?r=4658
jvn.jp/en/jp/JVN63650108/index.html
jvndb.jvn.jp/ja/contents/2012/JVNDB-2012-000094.html
lists.fedoraproject.org/pipermail/package-announce/2012-September/088138.html
secunia.com/advisories/50589
www.mandriva.com/security/advisories?name=MDVSA-2014:221
www.openwall.com/lists/oss-security/2012/09/19/1
www.openwall.com/lists/oss-security/2012/09/20/3
www.securityfocus.com/bid/55506
github.com/smarty-php/smarty/commit/4305a8931cbb817f8e2690aff03fc78460c878e1
github.com/smarty-php/smarty/commit/b67c7082a749dff5af90a280b73daed0fb093eef