Arbitrary Command Injection Affecting python-pillow-tk package, versions <0:2.0.0-23.gitd1c6db8.amzn2.0.10
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-AMZN2-PYTHONPILLOWTK-6228701
- published 6 Feb 2024
- disclosed 19 Jan 2024
Introduced: 19 Jan 2024
CVE-2023-50447 Open this link in a new tabHow to fix?
Upgrade Amazon-Linux:2 python-pillow-tk to version 0:2.0.0-23.gitd1c6db8.amzn2.0.10 or higher.
This issue was patched in ALAS2-2024-2444.
NVD Description
Note: Versions mentioned in the description apply only to the upstream python-pillow-tk package and not the python-pillow-tk package as distributed by Amazon-Linux.
See How to fix? for Amazon-Linux:2 relevant fixed versions and status.
Pillow through 10.1.0 allows PIL.ImageMath.eval Arbitrary Code Execution via the environment parameter, a different vulnerability than CVE-2022-22817 (which was about the expression parameter).
References
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50447
- https://devhub.checkmarx.com/cve-details/CVE-2023-50447/
- https://duartecsantos.github.io/2023-01-02-CVE-2023-50447/
- https://github.com/python-pillow/Pillow/releases
- http://www.openwall.com/lists/oss-security/2024/01/20/1
- https://lists.debian.org/debian-lts-announce/2024/01/msg00019.html
- https://duartecsantos.github.io/2024-01-02-CVE-2023-50447/