Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

CVE-2022-29221 (High) detected in smarty/smarty-v3.1.44 #6

Closed
mend-bolt-for-github bot opened this issue May 30, 2022 · 1 comment
Closed

CVE-2022-29221 (High) detected in smarty/smarty-v3.1.44 #6

mend-bolt-for-github bot opened this issue May 30, 2022 · 1 comment
Labels
security vulnerability Security vulnerability detected by WhiteSource

Comments

@mend-bolt-for-github
Copy link
Contributor

CVE-2022-29221 - High Severity Vulnerability

Vulnerable Library - smarty/smarty-v3.1.44

Smarty - the compiling PHP template engine

Library home page: https://api.github.com/repos/smarty-php/smarty/zipball/99085d8dc65eeb5e55ae3cba74d3dc6b3bb0205e

Dependency Hierarchy:

  • imponeer/smarty-extensions-contracts-v1.0.0 (Root Library)
    • smarty/smarty-v3.1.44 (Vulnerable Library)

Found in base branch: main

Vulnerability Details

Smarty is a template engine for PHP, facilitating the separation of presentation (HTML/CSS) from application logic. Prior to versions 3.1.45 and 4.1.1, template authors could inject php code by choosing a malicious {block} name or {include} file name. Sites that cannot fully trust template authors should upgrade to versions 3.1.45 or 4.1.1 to receive a patch for this issue. There are currently no known workarounds.

Publish Date: 2022-05-24

URL: CVE-2022-29221

CVSS 3 Score Details (8.8)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: Low
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: GHSA-634x-pc3q-cf4c

Release Date: 2022-05-24

Fix Resolution: v3.1.45;v4.1.1


Step up your Open Source Security Game with Mend here

@mend-bolt-for-github mend-bolt-for-github bot added the security vulnerability Security vulnerability detected by WhiteSource label May 30, 2022
@MekDrop
Copy link
Member

MekDrop commented Sep 13, 2022

This doesn't related directly to this package so closing.

@MekDrop MekDrop closed this as completed Sep 13, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
security vulnerability Security vulnerability detected by WhiteSource
Development

No branches or pull requests

1 participant