CVE-2023-50447

Name
CVE-2023-50447
Description
Pillow through 10.1.0 allows PIL.ImageMath.eval Arbitrary Code Execution via the environment parameter, a different vulnerability than CVE-2022-22817 (which was about the expression parameter).
NVD Severity
high
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
cve@mitre.org https://devhub.checkmarx.com/cve-details/CVE-2023-50447/
cve@mitre.org https://duartecsantos.github.io/2023-01-02-CVE-2023-50447/
cve@mitre.org https://github.com/python-pillow/Pillow/releases
mailing-list http://www.openwall.com/lists/oss-security/2024/01/20/1
mailing-list https://lists.debian.org/debian-lts-announce/2024/01/msg00019.html
cve@mitre.org https://duartecsantos.github.io/2024-01-02-CVE-2023-50447/

Match rules

CPE URI Source package Min version Max version
n/a == n/a == n/a

Vulnerable and fixed packages

Source package Branch Version Maintainer Status