RadiusAdmin
                                
                                
                                
                                    RadiusAdmin copied to clipboard
                            
                            
                            
                        Bump smarty/smarty from 3.1.27 to 3.1.48
Bumps smarty/smarty from 3.1.27 to 3.1.48.
Release notes
Sourced from smarty/smarty's releases.
v3.1.48
Security
- Fixed Cross site scripting vulnerability in Javascript escaping. This addresses CVE-2023-28447.
 Fixed
- Output buffer is now cleaned for internal PHP errors as well, not just for Exceptions #514
 v3.1.47
If you use the {mailto} plugin in your templates, please check if you are escaping the address value explicitly like this
{mailto address=$htmladdress|escape}. This could cause problems through double escaping.Security
- Applied appropriate javascript and html escaping in mailto plugin to counter injection attacks #454
 Fixed
- Fixed use of
 rand()without a parameter in math function #794- Fixed unselected year/month/day not working in html_select_date #395
 v3.1.46
What's Changed
- Fixed replace modifier by converting encoding if needed by
 @AnrDaemonin smarty-php/smarty#740- Fixed second param of unescape modifier by
 @wisskidin smarty-php/smarty#779Full Changelog: https://github.com/smarty-php/smarty/compare/v3.1.45...v3.1.46
v3.1.45
Security
- Prevent PHP injection through malicious block name or include file name. This addresses CVE-2022-29221
 Fixed
- Math equation
 max(x, y)didn't work anymore #721v3.1.44
What's Changed
- Fixes illegal characters warning in math
 Full Changelog: https://github.com/smarty-php/smarty/compare/v3.1.43...v3.1.44
v3.1.43
Prevent evasion of the
static_classessecurity policy. This addresses CVE-2021-21408Full Changelog: https://github.com/smarty-php/smarty/compare/v3.1.42...v3.1.43
v3.1.42
Prevent arbitrary PHP code execution through maliciously crafted expression for the math function. This addresses CVE-2021-29454
Full Changelog: https://github.com/smarty-php/smarty/compare/v3.1.41...v3.1.42
... (truncated)
Changelog
Sourced from smarty/smarty's changelog.
[3.1.48] - 2023-03-28
Security
- Fixed Cross site scripting vulnerability in Javascript escaping. This addresses CVE-2023-28447.
 Fixed
- Output buffer is now cleaned for internal PHP errors as well, not just for Exceptions #514
 [3.1.47] - 2022-09-14
Security
- Applied appropriate javascript and html escaping in mailto plugin to counter injection attacks #454
 Fixed
- Fixed use of
 rand()without a parameter in math function #794- Fixed unselected year/month/day not working in html_select_date #395
 - Updated requirement contraint for 'php' in composer.json to correctly reflect that Smarty3 does not support PHP8. Please upgrade to Smarty4 to use PHP8.
 [3.1.46] - 2022-08-01
Fixed
- Fixed problems with smarty_mb_str_replace #549
 - Fixed second parameter of unescape modifier not working #777
 [3.1.45] - 2022-05-17
Security
- Prevent PHP injection through malicious block name or include file name. This addresses CVE-2022-29221
 Fixed
- Math equation
 max(x, y)didn't work anymore #721[3.1.44] - 2022-01-18
Fixed
- Fixed illegal characters bug in math function security check #702
 [3.1.43] - 2022-01-10
Security
- Prevent evasion of the
 static_classessecurity policy. This addresses CVE-2021-21408[3.1.42] - 2022-01-10
Security
- Prevent arbitrary PHP code execution through maliciously crafted expression for the math function. This addresses CVE-2021-29454
 [3.1.41] - 2022-01-09
Security
... (truncated)
Commits
2fc4438Merge branch 'release/3.1.48' into support/3.1e4cbb1dversion bumpdf9b93dAdd changeloge09df8dMerge branch 'js_escape_security_fix_31' into support/3.17677db7Implement fix and testse58c3ddUpdate changeloge1fb2adclean output buffer for Throwable instead of just Exception (#798)1a69f4eRe-organize testrunners to use the same script(s).a09364fMerge branch 'release/3.1.47' into support/3.1c51719bversion bump- Additional commits viewable in compare view
 
Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.
Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR:
@dependabot rebasewill rebase this PR@dependabot recreatewill recreate this PR, overwriting any edits that have been made to it@dependabot mergewill merge this PR after your CI passes on it@dependabot squash and mergewill squash and merge this PR after your CI passes on it@dependabot cancel mergewill cancel a previously requested merge and block automerging@dependabot reopenwill reopen this PR if it is closed@dependabot closewill close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually@dependabot ignore this major versionwill close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)@dependabot ignore this minor versionwill close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)@dependabot ignore this dependencywill close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself) You can disable automated security fix PRs for this repo from the Security Alerts page.