USN-5348-2

Source
https://ubuntu.com/security/notices/USN-5348-2
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5348-2.json
JSON Data
https://api.osv.dev/v1/vulns/USN-5348-2
Related
Published
2022-03-28T13:22:18.709387Z
Modified
2022-03-28T13:22:18.709387Z
Summary
smarty3 vulnerabilities
Details

USN-5348-1 fixed several vulnerabilities in Smarty. This update provides the fixes for CVE-2021-21408, CVE-2021-26119, CVE-2021-26120 and CVE-2021-29454 for Ubuntu 16.04 ESM.

Original advisory details:

David Gnedt and Thomas Konrad discovered that Smarty was incorrectly sanitizing the paths present in the templates. An attacker could possibly use this use to read arbitrary files when controlling the executed template. (CVE-2018-13982)

It was discovered that Smarty was incorrectly sanitizing the paths present in the templates. An attacker could possibly use this use to read arbitrary files when controlling the executed template. (CVE-2018-16831)

It was discovered that Smarty was incorrectly validating security policy data, allowing the execution of static classes even when not permitted by the security settings. An attacker could possibly use this issue to execute arbitrary code. (CVE-2021-21408)

It was discovered that Smarty was incorrectly managing access control to template objects, which allowed users to perform a sandbox escape. An attacker could possibly use this issue to send specially crafted input to applications that use Smarty and execute arbitrary code. (CVE-2021-26119)

It was discovered that Smarty was not checking for special characters when setting function names during plugin compile operations. An attacker could possibly use this issue to send specially crafted input to applications that use Smarty and execute arbitrary code. (CVE-2021-26120)

It was discovered that Smarty was incorrectly sanitizing characters in math strings processed by the math function. An attacker could possibly use this issue to send specially crafted input to applications that use Smarty and execute arbitrary code. (CVE-2021-29454)

References

Affected packages

Ubuntu:Pro:16.04:LTS / smarty3

Package

Name
smarty3
Purl
pkg:deb/ubuntu/smarty3?arch=src?distro=esm-apps/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.1.21-1ubuntu1+esm1

Affected versions

3.*

3.1.21-1
3.1.21-1ubuntu1

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
    "binaries": [
        {
            "binary_version": "3.1.21-1ubuntu1+esm1",
            "binary_name": "smarty3"
        }
    ]
}