4.3
CVSSv2

CVE-2016-3718

Published: 05/05/2016 Updated: 12/02/2023
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 6.3 | Impact Score: 4 | Exploitability Score: 1.8
VMScore: 436
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

The (1) HTTP and (2) FTP coders in ImageMagick prior to 6.9.3-10 and 7.x prior to 7.0.1-1 allow remote malicious users to conduct server-side request forgery (SSRF) attacks via a crafted image.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

canonical ubuntu linux 12.04

canonical ubuntu linux 16.04

canonical ubuntu linux 15.10

canonical ubuntu linux 14.04

imagemagick imagemagick 7.0.0-0

imagemagick imagemagick

imagemagick imagemagick 7.0.1-0

redhat enterprise linux server supplementary eus 6.7z

redhat enterprise linux desktop 7.0

redhat enterprise linux server aus 7.2

redhat enterprise linux workstation 7.0

redhat enterprise linux server 7.0

redhat enterprise linux hpc node 6.0

redhat enterprise linux hpc node 7.0

redhat enterprise linux server eus 7.2

redhat enterprise linux desktop 6.0

redhat enterprise linux hpc node eus 7.2

redhat enterprise linux server 6.0

redhat enterprise linux workstation 6.0

Vendor Advisories

Debian Bug report logs - #814732 graphicsmagick: SVG parsing issues (CVE-2016-2317, CVE-2016-2318) Package: src:graphicsmagick; Maintainer for src:graphicsmagick is Laszlo Boszormenyi (GCS) <gcs@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Sun, 14 Feb 2016 19:27:01 UTC Severity: important ...
Several security issues were fixed in ImageMagick ...
Nikolay Ermishkin from the MailRu Security Team and Stewie discovered several vulnerabilities in ImageMagick, a program suite for image manipulation These vulnerabilities, collectively known as ImageTragick, are the consequence of lack of sanitization of untrusted input An attacker with control on the image input could, with the privileges of th ...
It was discovered that ImageMagick did not properly sanitize certain input before passing it to the delegate functionality A remote attacker could create a specially crafted image that, when processed by an application using ImageMagick or an unsuspecting user using the ImageMagick utilities, would lead to arbitrary execution of shell commands wit ...
A server-side request forgery flaw was discovered in the way ImageMagick processed certain images A remote attacker could exploit this flaw to mislead an application using ImageMagick or an unsuspecting user using the ImageMagick utilities into, for example, performing HTTP(S) requests or opening FTP sessions via specially crafted images ...

Exploits

Nikolay Ermishkin from the MailRu Security Team discovered several vulnerabilities in ImageMagick We've reported these issues to developers of ImageMagick and they made a fix for RCE in sources and released new version (693-9 released 2016-04-30 legacyimagemagickorg/script/changelogphp), but this fix seems to be incomplete We are sti ...

Github Repositories

Change UploadScanner extension a bit to suit some of the target

UploadScanner Burp extension A Burp Suite Pro extension to do security tests for HTTP file uploads Table of Contents Abstract Main feature Installation Tutorials About Background information and FAQ TL;DR and important infos Basics Checklist I broke the website, omg, what did I do? Limitations Detecting issues Detecting successful uploads FlexiInjector - Detecting requests

UploadScanner Burp extension A Burp Suite Pro extension to do security tests for HTTP file uploads Table of Contents Abstract Main feature Installation Tutorials About Background information and FAQ TL;DR and important infos Basics Checklist I broke the website, omg, what did I do? Limitations Detecting issues Detecting successful uploads FlexiInjector - Detecting requests

HTTP file upload scanner for Burp Proxy

UploadScanner Burp extension A Burp Suite Pro extension to do security tests for HTTP file uploads Table of Contents Abstract Main feature Installation Tutorials About Background information and FAQ TL;DR and important infos Basics Checklist I broke the website, omg, what did I do? Limitations Detecting issues Detecting successful uploads FlexiInjector - Detecting requests