snowdensb / CSPBR

CSP Bit Ranger Solution
0 stars 0 forks source link

CVE-2022-29221 (High) detected in smarty/smarty-v3.1.39 #21

Open mend-for-github-com[bot] opened 2 years ago

mend-for-github-com[bot] commented 2 years ago

CVE-2022-29221 - High Severity Vulnerability

Vulnerable Library - smarty/smarty-v3.1.39

Smarty - the compiling PHP template engine

Library home page: https://api.github.com/repos/smarty-php/smarty/zipball/e27da524f7bcd7361e3ea5cdfa99c4378a7b5419

Dependency Hierarchy: - :x: **smarty/smarty-v3.1.39** (Vulnerable Library)

Found in HEAD commit: 86334f0df744f6cfa35a438987cbb4d18d65b5c2

Found in base branch: master

Vulnerability Details

Smarty is a template engine for PHP, facilitating the separation of presentation (HTML/CSS) from application logic. Prior to versions 3.1.45 and 4.1.1, template authors could inject php code by choosing a malicious {block} name or {include} file name. Sites that cannot fully trust template authors should upgrade to versions 3.1.45 or 4.1.1 to receive a patch for this issue. There are currently no known workarounds.

Publish Date: 2022-05-24

URL: CVE-2022-29221

CVSS 3 Score Details (8.8)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://github.com/smarty-php/smarty/security/advisories/GHSA-634x-pc3q-cf4c

Release Date: 2022-05-24

Fix Resolution: v3.1.45;v4.1.1