Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2018-25047

Опубликовано: 15 сент. 2022
Источник: debian
EPSS Низкий

Описание

In Smarty before 3.1.47 and 4.x before 4.2.1, libs/plugins/function.mailto.php allows XSS. A web page that uses smarty_function_mailto, and that could be parameterized using GET or POST input parameters, could allow injection of JavaScript code by a user.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
smarty3fixed3.1.47-1package
smarty4fixed4.2.1-1package

Примечания

  • https://github.com/smarty-php/smarty/issues/454

  • https://github.com/smarty-php/smarty/commit/f1f7ee6e34c14a8a9dfa5c6ef894d39277a93938 (v3.1.47)

  • https://github.com/smarty-php/smarty/commit/55ea25d1f50f0406fb1ccedd212c527977793fc9 (v4.2.1)

EPSS

Процентиль: 67%
0.00527
Низкий

Связанные уязвимости

CVSS3: 5.4
ubuntu
больше 3 лет назад

In Smarty before 3.1.47 and 4.x before 4.2.1, libs/plugins/function.mailto.php allows XSS. A web page that uses smarty_function_mailto, and that could be parameterized using GET or POST input parameters, could allow injection of JavaScript code by a user.

CVSS3: 5.4
nvd
больше 3 лет назад

In Smarty before 3.1.47 and 4.x before 4.2.1, libs/plugins/function.mailto.php allows XSS. A web page that uses smarty_function_mailto, and that could be parameterized using GET or POST input parameters, could allow injection of JavaScript code by a user.

CVSS3: 5.4
github
больше 3 лет назад

Smarty Cross-site Scripting vulnerability in pages that use smarty_function_mailto

EPSS

Процентиль: 67%
0.00527
Низкий