Last Modified: Feb. 14, 2023
ImageMagick 7.1.0-49 is vulnerable to Information Disclosure. When it parses a PNG image (e.g., for resize), the resulting image could have embedded the content of an arbitrary. file (if the magick binary has permissions to read it).
Tweets last week: 31
Remaining steady
Yahoo results: 724000
Strongly raising
Current EPSS Score: 0.0051
Remaining steady
Reddit Posts: 11
Remaining steady
Github Repos: 12
Remaining steady
Found exploits:
Attack Vector: Network
Attack Complexity: Low
Privileges Required: None
User Interaction: Required
Scope: Unchanged
Confidentiality: High
Integrity: None
Availability: None
Base Score: 6.5
Exploitability Score:
2.8
Impact Score: 3.6
CVSS V3: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
NVD-CWE-noinfo
Condition | Configuration | |
---|---|---|
OR | ||
OR | ||
cpe:2.3:a:imagemagick:imagemagick:7.1.0-49:*:*:*:*:*:*:* Part: a Vendor: imagemagick | Alle Schwachstellen für imagemagick |
CWE-ID:
Not defined
Base Score V3:
Not defined
Exploitability Score V3:
Not defined
Impact Score V3:
Not defined
Cvss Vector V3:
Not defined
Configuration:
added:
cpe:2.3:a:imagemagick:imagemagick:7.1.0-49:*:*:*:*:*:*:*
Reference:
added:
https://www.debian.org/security/2023/dsa-5347
Reference:
added:
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZZLLS37P67CMBRML6OCG42GPCKGRCJNV/
Reference:
added:
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AINSUL2QBKETGYRPA7XSCMJWLUB44M6S/
Reference:
added:
https://lists.debian.org/debian-lts-announce/2023/03/msg00008.html
<?xml version="1.0" ?> <set operator="and"> <set operator="or"> <prop key="application" value="cpe:2.3:a:imagemagick:imagemagick:7.1.0-49:*:*:*:*:*:*:*"/> </set> </set>
<?xml version="1.0" ?> <set operator="and"> <set operator="or"> <prop key="application" value="cpe:2.3:a:imagemagick:imagemagick:7.1.0-49:*:*:*:*:*:*:*"/> </set> <prop key="program_influence" value="input"/> </set>