Cross-site scripting (XSS) vulnerability in the SmartyException class in Smarty (aka smarty-php) before 3.1.12 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors that trigger a Smarty exception.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
http://www.openwall.com/lists/oss-security/2012/09/19/1 | mailing list |
http://lists.fedoraproject.org/pipermail/package-announce/2012-September/088138.html | vendor advisory |
http://code.google.com/p/smarty-php/source/browse/trunk/distribution/change_log.txt | |
http://advisories.mageia.org/MGASA-2014-0468.html | |
http://secunia.com/advisories/50589 | third party advisory vendor advisory |
http://www.mandriva.com/security/advisories?name=MDVSA-2014:221 | vendor advisory |
http://jvndb.jvn.jp/ja/contents/2012/JVNDB-2012-000094.html | third party advisory |
http://jvn.jp/en/jp/JVN63650108/index.html | third party advisory |
http://www.openwall.com/lists/oss-security/2012/09/20/3 | mailing list |
http://www.securityfocus.com/bid/55506 | vdb entry |
http://code.google.com/p/smarty-php/source/detail?r=4658 | patch |