Improper Input Validation Affecting imagemagick package, versions >=0.0.0
Snyk CVSS
Attack Complexity
Low
Confidentiality
High
Integrity
High
Availability
High
Threat Intelligence
Exploit Maturity
Mature
EPSS
96.86% (100th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-COCOAPODS-IMAGEMAGICK-470646
- published 2 Oct 2019
- disclosed 3 May 2016
- credit Unknown
How to fix?
There is no fixed version for ImageMagick
.
Overview
ImageMagick is a pod that allows you to convert, edit and compose Images.
Affected versions of this package are vulnerable to Improper Input Validation. ImageMagick is vulnerable to remote code execution (RCE). The library does not sanitize certain user inputs, allowing a malicious user to pass a malicious image to the system for file conversion to trigger the execution of arbitrary code. This is also known as the ImageTragick
vulnerability.
References
- BUGTRAQ
- Cert Vulnerability Note
- CONFIRM
- CONFIRM
- CONFIRM
- CONFIRM
- Debian Security Advisory
- Debian Security Advisory
- Exploit DB
- Exploit DB
- Gentoo Security Advisory
- MISC
- MISC
- MISC
- OpenSuse Security Announcement
- OpenSuse Security Announcement
- OpenSuse Security Announcement
- OpenSuse Security Announcement
- OpenSuse Security Announcement
- OpenSuse Security Announcement
- Oracle Security Bulletin
- Oracle Security Bulletin
- OSS security Advisory
- OSS security Advisory
- RedHat Bugzilla Bug
- RedHat Security Advisory
- Security Focus
- Security Tracker
- SLACKWARE
- Ubuntu Security Advisory
- Exploit DB