CVE-2023-50447 (High) detected in Pillow-9.3.0-cp37-cp37m-manylinux_2_17_x86_64.manylinux2014_x86_64.whl #436
Labels
Mend: dependency security vulnerability
Security vulnerability detected by WhiteSource
CVE-2023-50447 - High Severity Vulnerability
Python Imaging Library (Fork)
Library home page: https://files.pythonhosted.org/packages/c0/47/4023dab2d77ea3f687939770b06e0c191b4a5a20590f158a6e8dbb03e357/Pillow-9.3.0-cp37-cp37m-manylinux_2_17_x86_64.manylinux2014_x86_64.whl
Path to dependency file: /clang/utils/analyzer/requirements.txt
Path to vulnerable library: /clang/utils/analyzer/requirements.txt,/clang/utils/check_cfc,/cross-project-tests/debuginfo-tests/dexter/dex/debugger/dbgeng
Dependency Hierarchy:
Found in HEAD commit: 4f97c7dce61b53c61f1bd1f45c2a5ddf5cae7da1
Found in base branch: main
Pillow through 10.1.0 allows PIL.ImageMath.eval Arbitrary Code Execution via the environment parameter, a different vulnerability than CVE-2022-22817 (which was about the expression parameter).
Publish Date: 2024-01-19
URL: CVE-2023-50447
Base Score Metrics:
Type: Upgrade version
Origin: https://www.openwall.com/lists/oss-security/2024/01/20/1
Release Date: 2024-01-19
Fix Resolution: pillow - 10.2.0
Step up your Open Source Security Game with Mend here
The text was updated successfully, but these errors were encountered: