CVE-2017-14650

Source
https://cve.org/CVERecord?id=CVE-2017-14650
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2017-14650.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2017-14650
Downstream
Published
2017-09-21T17:29:00.590Z
Modified
2026-02-05T01:34:07.481526Z
Severity
  • 8.1 (High) CVSS_V3 - CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

A Remote Code Execution vulnerability has been found in the HordeImage library when using the "Im" backend that utilizes ImageMagick's "convert" utility. It's not exploitable through any Horde application, because the code path to the vulnerability is not used by any Horde code. Custom applications using the HordeImage library might be affected. This vulnerability affects all versions of Horde_Image from 2.0.0 to 2.5.1, and is fixed in 2.5.2. The problem is missing input validation of the index field in _raw() during construction of an ImageMagick command line.

References

Affected packages

Git / github.com/horde/image

Affected ranges

Type
GIT
Repo
https://github.com/horde/image
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected
Last affected

Affected versions

v1.*
v1.0.0
v1.0.0beta1
v1.0.0rc1
v1.0.0rc2
v1.0.1
v1.0.10
v1.0.2
v1.0.3
v1.0.4
v1.0.6
v1.0.7
v1.0.8
v1.0.9
v2.*
v2.0.0
v2.0.0alpha1
v2.0.0beta1
v2.0.0beta2
v2.0.1
v2.0.2
v2.0.3
v2.0.4
v2.0.5
v2.0.6
v2.0.7
v2.0.8
v2.0.9
v2.1.0
v2.2.0
v2.3.0

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2017-14650.json"