CVE-2023-50447
Publication date 19 January 2024
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
Pillow through 10.1.0 allows PIL.ImageMath.eval Arbitrary Code Execution via the environment parameter, a different vulnerability than CVE-2022-22817 (which was about the expression parameter).
Status
Package | Ubuntu Release | Status |
---|---|---|
pillow | 24.10 oracular |
Fixed 10.2.0-1
|
24.04 LTS noble |
Fixed 10.2.0-1
|
|
22.04 LTS jammy |
Fixed 9.0.1-1ubuntu0.2
|
|
20.04 LTS focal |
Fixed 7.0.0-4ubuntu0.8
|
|
18.04 LTS bionic |
Needs evaluation
|
|
16.04 LTS xenial |
Needs evaluation
|
|
14.04 LTS trusty |
Needs evaluation
|
|
pillow-python2 | 24.10 oracular | Not in release |
24.04 LTS noble | Not in release | |
22.04 LTS jammy | Not in release | |
20.04 LTS focal |
Needs evaluation
|
|
18.04 LTS bionic | Not in release | |
16.04 LTS xenial | Not in release | |
14.04 LTS trusty | Not in release |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 8.1 · High |
Attack vector | Network |
Attack complexity | High |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H |
References
Related Ubuntu Security Notices (USN)
- USN-6618-1
- Pillow vulnerabilities
- 30 January 2024
Other references
- https://duartecsantos.github.io/2023-01-02-CVE-2023-50447/
- https://pillow.readthedocs.io/en/stable/releasenotes/10.2.0.html#imagemath-eval-restricted-environment-keys
- https://devhub.checkmarx.com/cve-details/CVE-2023-50447/
- http://www.openwall.com/lists/oss-security/2024/01/20/1
- https://www.cve.org/CVERecord?id=CVE-2023-50447