Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!Close

CVE-2023-28447

Published: 28 March 2023

Smarty is a template engine for PHP. In affected versions smarty did not properly escape javascript code. An attacker could exploit this vulnerability to execute arbitrary JavaScript code in the context of the user's browser session. This may lead to unauthorized access to sensitive user data, manipulation of the web application's behavior, or unauthorized actions performed on behalf of the user. Users are advised to upgrade to either version 3.1.48 or to 4.3.1 to resolve this issue. There are no known workarounds for this vulnerability.

Notes

AuthorNote
ccdm94
postfixadmin does not contain embedded copies of smarty in trusty and
xenial. In bionic, postfixadmin contains an embedded smarty copy at
version 3.1.29, while in jammy it contains an embedded copy at version
3.1.33. In lunar and mantic this copy is at version 4.3.0.

Priority

High

Cvss 3 Severity Score

6.1

Score breakdown

Status

Package Release Status
civicrm
Launchpad, Ubuntu, Debian
kinetic Ignored
(end of life, was needs-triage)
focal Needs triage

jammy Needs triage

trusty Ignored
(end of standard support)
upstream Needs triage

xenial Needs triage

bionic Needs triage

lunar Does not exist

mantic Does not exist

smarty3
Launchpad, Ubuntu, Debian
kinetic Ignored
(end of life, was needs-triage)
bionic Needs triage

focal Needs triage

jammy Needs triage

trusty Ignored
(end of standard support)
upstream Needs triage

xenial Needs triage

lunar Needs triage

mantic Needs triage

smarty4
Launchpad, Ubuntu, Debian
kinetic Ignored
(end of life, was needs-triage)
bionic Does not exist

focal Does not exist

jammy Does not exist

trusty Ignored
(end of standard support)
upstream Needs triage

xenial Ignored
(end of standard support)
lunar Needs triage

mantic Needs triage

postfixadmin
Launchpad, Ubuntu, Debian
trusty Ignored
(end of standard support)
bionic Needed

focal Needed

jammy Needed

kinetic Ignored
(end of life, was needed)
lunar Needed

mantic Needed

upstream Needed

xenial Not vulnerable
(code not present)

Severity score breakdown

Parameter Value
Base score 6.1
Attack vector Network
Attack complexity Low
Privileges required None
User interaction Required
Scope Changed
Confidentiality Low
Integrity impact Low
Availability impact None
Vector CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N