CVE-2020-29599

ImageMagick before 6.9.11-40 and 7.x before 7.0.10-40 mishandles the -authenticate option, which allows setting a password for password-protected PDF files. The user-controlled password was not properly escaped/sanitized and it was therefore possible to inject additional shell commands via coders/pdf.c.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*
cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

History

21 Nov 2024, 05:24

Type Values Removed Values Added
References () https://github.com/ImageMagick/ImageMagick/discussions/2851 - Exploit, Third Party Advisory () https://github.com/ImageMagick/ImageMagick/discussions/2851 - Exploit, Third Party Advisory
References () https://insert-script.blogspot.com/2020/11/imagemagick-shell-injection-via-pdf.html - Third Party Advisory () https://insert-script.blogspot.com/2020/11/imagemagick-shell-injection-via-pdf.html - Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2021/01/msg00010.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2021/01/msg00010.html - Mailing List, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2023/03/msg00008.html - () https://lists.debian.org/debian-lts-announce/2023/03/msg00008.html -
References () https://security.gentoo.org/glsa/202101-36 - Third Party Advisory () https://security.gentoo.org/glsa/202101-36 - Third Party Advisory

Information

Published : 2020-12-07 20:15

Updated : 2024-11-21 05:24


NVD link : CVE-2020-29599

Mitre link : CVE-2020-29599

CVE.ORG link : CVE-2020-29599


JSON object : View

Products Affected

debian

  • debian_linux

imagemagick

  • imagemagick
CWE
CWE-91

XML Injection (aka Blind XPath Injection)