Package "smarty3"
  
    
    
        | Name: | smarty3 | 
    
        | Description:
 | Smarty - the compiling PHP template engine | 
    
        | Latest version: | 3.1.31+20161214.1.c7d42e4+selfpack1-3ubuntu0.1 | 
    
        | Release: | bionic (18.04) | 
    
        | Level: | updates | 
    
        | Repository: | universe | 
        
            | Homepage: | http://www.smarty.net/ | 
    
   
  
  
 
Links
    Download "smarty3"
    
Other versions of "smarty3" in Bionic
    
Changelog
    
    
    
        
        
    
    
        |   smarty3 (3.1.31+20161214.1.c7d42e4+selfpack1-3ubuntu0.1) bionic-security; urgency=medium   * SECURITY UPDATE: path traversal in Smarty templates
- debian/patches/CVE-2018-13982-1.patch: perform validation over
 directory provided in libs/Smarty.class.php and
 libs/sysplugins/smarty_security.php
 - debian/patches/CVE-2018-13982-2.patch: reformat code of
 previous patch and add additional checks.
 - debian/patches/CVE-2018-13982-3.patch: alter regex validation
 of previous patches and update logic flow.
 - CVE-2018-13982
 - CVE-2018-16831
 * SECURITY UPDATE: execution of restricted php methods
 - debian/patches/CVE-2021-21408.patch: Prevent evasion of the
 static_classes security policy in
 lexer/smarty_internal_templateparser.y and
 libs/sysplugins/smarty_internal_templateparser.php.
 - CVE-2021-21408
 * SECURITY UPDATE: sandbox escape by accessing public object
 - debian/patches/CVE-2021-26119.patch: Prevent access to
 $smarty.template_object in sandbox mode in
 libs/sysplugins/
 smarty_internal_compile_private_special_variable.php.
 - CVE-2021-26119
 * SECURITY UPDATE: code injection through function name
 - debian/patches/CVE-2021-26120.patch: perform validation over
 the function name supplied in
 libs/sysplugins/smarty_internal_compile_function.php.
 - CVE-2021-26120
 * SECURITY UPDATE: code injection through math function
 - debian/patches/CVE-2021-29454.patch: verify if the input to
 the math function is a mathematical expression in
 libs/plugins/function.math.php.
 - CVE-2021-29454
  -- David Fernandez Gonzalez <email address hidden>  Mon, 21 Mar 2022 12:21:04 +0100 | 
    
        
        | 
                
                | CVE-2018-13982 | Smarty_Security::isTrustedResourceDir() in Smarty before 3.1.33 is prone to a path traversal vulnerability due to insufficient template code sanitiza |  
                | CVE-2018-16831 | Smarty before 3.1.33-dev-4 allows attackers to bypass the trusted_dir protection mechanism via a file:./../ substring in an include statement. |  
                | CVE-2021-21408 | Smarty is a template engine for PHP, facilitating the separation of presentation (HTML/CSS) from application logic. Prior to versions 3.1.43 and 4.0. |  
                | CVE-2021-26119 | Smarty before 3.1.39 allows a Sandbox Escape because $smarty.template_object can be accessed in sandbox mode. |  
                | CVE-2021-26120 | Smarty before 3.1.39 allows code injection via an unexpected function name after a {function name= substring. |  
                | CVE-2021-29454 | Smarty is a template engine for PHP, facilitating the separation of presentation (HTML/CSS) from application logic. Prior to versions 3.1.42 and 4.0. |  | 
    
    
        
        
        
            About
              -  
            Send Feedback to @ubuntu_updates