First published: Wed Sep 14 2022(Updated: )
In Smarty before 3.1.47 and 4.x before 4.2.1, libs/plugins/function.mailto.php allows XSS. A web page that uses smarty_function_mailto, and that could be parameterized using GET or POST input parameters, could allow injection of JavaScript code by a user.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
composer/smarty/smarty | <3.1.47>=4.0.0<4.2.1 | |
Smarty Smarty | <3.1.47 | |
Smarty Smarty | >=4.0.0<4.2.1 | |
Debian Debian Linux | =10.0 | |
debian/smarty3 | <=3.1.39-2+deb11u1 | 3.1.39-2+deb11u2 3.1.47-2 3.1.47-2+deb12u1 3.1.48-2 |
debian/smarty4 | 4.3.0-1+deb12u1 4.3.0-1+deb12u2 4.5.4-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.