USN-5348-1

Source
https://ubuntu.com/security/notices/USN-5348-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5348-1.json
JSON Data
https://api.osv.dev/v1/vulns/USN-5348-1
Related
Published
2022-03-28T10:09:49.684650Z
Modified
2022-03-28T10:09:49.684650Z
Summary
smarty3 vulnerabilities
Details

David Gnedt and Thomas Konrad discovered that Smarty was incorrectly sanitizing the paths present in the templates. An attacker could possibly use this use to read arbitrary files when controlling the executed template. (CVE-2018-13982)

It was discovered that Smarty was incorrectly sanitizing the paths present in the templates. An attacker could possibly use this use to read arbitrary files when controlling the executed template. (CVE-2018-16831)

It was discovered that Smarty was incorrectly validating security policy data, allowing the execution of static classes even when not permitted by the security settings. An attacker could possibly use this issue to execute arbitrary code. (CVE-2021-21408)

It was discovered that Smarty was incorrectly managing access control to template objects, which allowed users to perform a sandbox escape. An attacker could possibly use this issue to send specially crafted input to applications that use Smarty and execute arbitrary code. (CVE-2021-26119)

It was discovered that Smarty was not checking for special characters when setting function names during plugin compile operations. An attacker could possibly use this issue to send specially crafted input to applications that use Smarty and execute arbitrary code. (CVE-2021-26120)

It was discovered that Smarty was incorrectly sanitizing characters in math strings processed by the math function. An attacker could possibly use this issue to send specially crafted input to applications that use Smarty and execute arbitrary code. (CVE-2021-29454)

References

Affected packages

Ubuntu:18.04:LTS / smarty3

Package

Name
smarty3
Purl
pkg:deb/ubuntu/smarty3?arch=src?distro=bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.1.31+20161214.1.c7d42e4+selfpack1-3ubuntu0.1

Affected versions

3.*

3.1.31+20161214.1.c7d42e4+selfpack1-2
3.1.31+20161214.1.c7d42e4+selfpack1-3

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_version": "3.1.31+20161214.1.c7d42e4+selfpack1-3ubuntu0.1",
            "binary_name": "smarty3"
        }
    ]
}