[CVE-2012-4437] XSS in Smarty exception messages

Related Vulnerabilities: CVE-2012-4437  

Debian Bug report logs - #688153
[CVE-2012-4437] XSS in Smarty exception messages

version graph

Package: smarty3; Maintainer for smarty3 is Mike Gabriel <sunweaver@debian.org>; Source for smarty3 is src:smarty3 (PTS, buildd, popcon).

Reported by: Luciano Bello <luciano@debian.org>

Date: Wed, 19 Sep 2012 20:57:01 UTC

Severity: grave

Tags: patch, security

Fixed in version smarty3/3.1.10-2

Done: Mike Gabriel <mike.gabriel@das-netzwerkteam.de>

Bug is archived. No further changes may be made.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, Mike Gabriel <mike.gabriel@das-netzwerkteam.de>:
Bug#688153; Package smarty3. (Wed, 19 Sep 2012 20:57:03 GMT) (full text, mbox, link).


Acknowledgement sent to Luciano Bello <luciano@debian.org>:
New Bug report received and forwarded. Copy sent to Mike Gabriel <mike.gabriel@das-netzwerkteam.de>. (Wed, 19 Sep 2012 20:57:03 GMT) (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Luciano Bello <luciano@debian.org>
To: submit@bugs.debian.org
Subject: XSS in Smarty exception messages
Date: Wed, 19 Sep 2012 22:55:02 +0200
Package: smarty3
Severity: grave
Tags: security patch

The following vulnerability has been reported against smarty.
http://seclists.org/oss-sec/2012/q3/508

The link include a patch too.

Smarty 2 http://packages.qa.debian.org/s/smarty.html doesn't look affected, 
since the vulnerable code is not present. Can you confirm that?

Cheers, luciano



Changed Bug title to '[CVE-2012-4437] XSS in Smarty exception messages' from 'XSS in Smarty exception messages' Request was from Luciano Bello <luciano@debian.org> to control@bugs.debian.org. (Thu, 20 Sep 2012 19:15:08 GMT) (full text, mbox, link).


Reply sent to Mike Gabriel <mike.gabriel@das-netzwerkteam.de>:
You have taken responsibility. (Mon, 24 Sep 2012 14:51:03 GMT) (full text, mbox, link).


Notification sent to Luciano Bello <luciano@debian.org>:
Bug acknowledged by developer. (Mon, 24 Sep 2012 14:51:04 GMT) (full text, mbox, link).


Message #12 received at 688153-close@bugs.debian.org (full text, mbox, reply):

From: Mike Gabriel <mike.gabriel@das-netzwerkteam.de>
To: 688153-close@bugs.debian.org
Subject: Bug#688153: fixed in smarty3 3.1.10-2
Date: Mon, 24 Sep 2012 14:47:33 +0000
Source: smarty3
Source-Version: 3.1.10-2

We believe that the bug you reported is fixed in the latest version of
smarty3, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 688153@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Mike Gabriel <mike.gabriel@das-netzwerkteam.de> (supplier of updated smarty3 package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Sat, 22 Sep 2012 21:32:58 +0200
Source: smarty3
Binary: smarty3
Architecture: source all
Version: 3.1.10-2
Distribution: unstable
Urgency: low
Maintainer: Mike Gabriel <mike.gabriel@das-netzwerkteam.de>
Changed-By: Mike Gabriel <mike.gabriel@das-netzwerkteam.de>
Description: 
 smarty3    - Template engine for PHP
Closes: 688153
Changes: 
 smarty3 (3.1.10-2) unstable; urgency=low
 .
   * Fix CVE-2012-4437: Add patch 001_escape-smarty-exception-messages.patch.
     Closes: #688153.
Checksums-Sha1: 
 58d631101f2d3f00ca7395aa40553acbed0d21d8 1865 smarty3_3.1.10-2.dsc
 49ea738632c82fb5d0239385828e5091e48d6ed2 4303 smarty3_3.1.10-2.debian.tar.gz
 7d4ddaaaee8d3c71ff94b1abc27f01d7f66da418 206746 smarty3_3.1.10-2_all.deb
Checksums-Sha256: 
 61f1a223b76f5da9695e2d3d73f04f39bf6c6d5e6d1da234b78bb5c41e9319e2 1865 smarty3_3.1.10-2.dsc
 0719632b8bf234a452847d4071c41e0e3b9bebc87c351c1da87fbdf5db969aaa 4303 smarty3_3.1.10-2.debian.tar.gz
 3052b75bda673972f488ab46da7f60fb5f0817f946e453492578215aa1044ded 206746 smarty3_3.1.10-2_all.deb
Files: 
 21fad89603ba08914e2c7bfa6ae474f6 1865 web optional smarty3_3.1.10-2.dsc
 3a25b88800abd5c272d1f98a18f1f85c 4303 web optional smarty3_3.1.10-2.debian.tar.gz
 c2a2ab540f46600681b62310b2dddb69 206746 web optional smarty3_3.1.10-2_all.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
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=LFi4
-----END PGP SIGNATURE-----




Bug archived. Request was from Debbugs Internal Request <owner@bugs.debian.org> to internal_control@bugs.debian.org. (Sun, 02 Jun 2013 08:01:36 GMT) (full text, mbox, link).


Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Wed Jun 19 18:55:06 2019; Machine Name: beach

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.