CVE-2018-25047

NameCVE-2018-25047
DescriptionIn Smarty before 3.1.47 and 4.x before 4.2.1, libs/plugins/function.mailto.php allows XSS. A web page that uses smarty_function_mailto, and that could be parameterized using GET or POST input parameters, could allow injection of JavaScript code by a user.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-3262-1
Debian Bugs1019896, 1019897

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
smarty3 (PTS)jessie, jessie (lts)3.1.21-1+deb8u2vulnerable
stretch (security), stretch (lts), stretch3.1.31+20161214.1.c7d42e4+selfpack1-2+deb9u6vulnerable
buster (security), buster, buster (lts)3.1.33+20180830.1.3a78a21f+selfpack1-1+deb10u2fixed
bullseye (security), bullseye3.1.39-2+deb11u1vulnerable
bookworm3.1.47-2fixed
sid3.1.48-1fixed
smarty4 (PTS)bookworm4.3.0-1+deb12u1fixed
sid, trixie4.5.4-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
smarty3sourcejessie(unfixed)end-of-life
smarty3sourcestretch(unfixed)end-of-life
smarty3sourcebuster3.1.33+20180830.1.3a78a21f+selfpack1-1+deb10u2DLA-3262-1
smarty3source(unstable)3.1.47-11019897
smarty4source(unstable)4.2.1-11019896

Notes

[bullseye] - smarty3 <no-dsa> (Minor issue)
https://github.com/smarty-php/smarty/issues/454
https://github.com/smarty-php/smarty/commit/f1f7ee6e34c14a8a9dfa5c6ef894d39277a93938 (v3.1.47)
https://github.com/smarty-php/smarty/commit/55ea25d1f50f0406fb1ccedd212c527977793fc9 (v4.2.1)

Search for package or bug name: Reporting problems