MGASA-2018-0403

Source
https://advisories.mageia.org/MGASA-2018-0403.html
Import Source
https://advisories.mageia.org/MGASA-2018-0403.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2018-0403
Related
Published
2018-10-19T18:00:37Z
Modified
2018-10-19T17:34:33Z
Summary
Updated php-smarty packages fix security vulnerability
Details

Smarty 3.1.32 or below is prone to a path traversal vulnerability due to insufficient template code sanitization. This allows attackers controlling the executed template code to bypass the trusted directory security restriction and read arbitrary files (CVE-2018-13982).

References
Credits

Affected packages

Mageia:6 / php-smarty

Package

Name
php-smarty
Purl
pkg:rpm/mageia/php-smarty?distro=mageia-6

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.1.33-1.2.mga6

Ecosystem specific

{
    "section": "core"
}