Описание
In Smarty before 3.1.47 and 4.x before 4.2.1, libs/plugins/function.mailto.php allows XSS. A web page that uses smarty_function_mailto, and that could be parameterized using GET or POST input parameters, could allow injection of JavaScript code by a user.
Ссылки
- Issue TrackingThird Party Advisory
- ExploitIssue TrackingPatchThird Party Advisory
- Release Notes
- Release Notes
- Mailing ListThird Party Advisory
- Third Party Advisory
- Issue TrackingThird Party Advisory
- ExploitIssue TrackingPatchThird Party Advisory
- Release Notes
- Release Notes
- Mailing ListThird Party Advisory
- Third Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 3.1.47 (исключая)Версия от 4.0.0 (включая) до 4.2.1 (исключая)
Одно из
cpe:2.3:a:smarty:smarty:*:*:*:*:*:*:*:*
cpe:2.3:a:smarty:smarty:*:*:*:*:*:*:*:*
Конфигурация 2
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
EPSS
Процентиль: 67%
0.00527
Низкий
5.4 Medium
CVSS3
Дефекты
CWE-79
Связанные уязвимости
CVSS3: 5.4
ubuntu
больше 3 лет назад
In Smarty before 3.1.47 and 4.x before 4.2.1, libs/plugins/function.mailto.php allows XSS. A web page that uses smarty_function_mailto, and that could be parameterized using GET or POST input parameters, could allow injection of JavaScript code by a user.
CVSS3: 5.4
debian
больше 3 лет назад
In Smarty before 3.1.47 and 4.x before 4.2.1, libs/plugins/function.ma ...
CVSS3: 5.4
github
больше 3 лет назад
Smarty Cross-site Scripting vulnerability in pages that use smarty_function_mailto
EPSS
Процентиль: 67%
0.00527
Низкий
5.4 Medium
CVSS3
Дефекты
CWE-79