Vulnerability Details : CVE-2023-50447
Potential exploit
Pillow through 10.1.0 allows PIL.ImageMath.eval Arbitrary Code Execution via the environment parameter, a different vulnerability than CVE-2022-22817 (which was about the expression parameter).
Products affected by CVE-2023-50447
- cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
- cpe:2.3:a:python:pillow:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-50447
0.38%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 58 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-50447
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
8.1
|
HIGH | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H |
2.2
|
5.9
|
134c704f-9b21-4f2e-91b3-4a467353bcc0 | 2024-08-01 |
8.1
|
HIGH | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H |
2.2
|
5.9
|
NIST | 2024-01-26 |
CWE ids for CVE-2023-50447
-
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.Assigned by: nvd@nist.gov (Primary)
-
The product receives input from an upstream component, but it does not neutralize or incorrectly neutralizes code syntax before using the input in a dynamic evaluation call (e.g. "eval").Assigned by: 134c704f-9b21-4f2e-91b3-4a467353bcc0 (Secondary)
References for CVE-2023-50447
-
https://devhub.checkmarx.com/cve-details/CVE-2023-50447/
Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection') - CVE-2023-50447 - DevHubThird Party Advisory
-
https://duartecsantos.github.io/2024-01-02-CVE-2023-50447/
Arbitrary Code Execution in Pillow
-
https://lists.debian.org/debian-lts-announce/2024/01/msg00019.html
[SECURITY] [DLA 3724-1] pillow security updateMailing List;Third Party Advisory
-
https://duartecsantos.github.io/2023-01-02-CVE-2023-50447/
Arbitrary Code Execution in PillowExploit;Third Party Advisory
-
https://github.com/python-pillow/Pillow/releases
Releases ยท python-pillow/PillowRelease Notes
-
http://www.openwall.com/lists/oss-security/2024/01/20/1
oss-security - Pillow 10.2.0 released, fixes CVE-2023-50447Mailing List;Third Party Advisory
Jump to