7.8
CVSSv3

CVE-2021-45463

Published: 23/12/2021 Updated: 07/11/2023
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 605
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

load_cache in GEGL prior to 0.4.34 allows shell expansion when a pathname in a constructed command line is not escaped or filtered. This is caused by use of the system library function for execution of the ImageMagick convert fallback in magick-load. NOTE: GEGL releases prior to 0.4.34 are used in GIMP releases prior to 2.10.30; however, this does not imply that GIMP builds enable the vulnerable feature.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

gegl gegl

gimp gimp

redhat enterprise linux 7.0

redhat enterprise linux 8.0

fedoraproject fedora 34

fedoraproject fedora 35

Vendor Advisories

Debian Bug report logs - #1002661 gegl: CVE-2021-45463 Package: src:gegl; Maintainer for src:gegl is Debian GNOME Maintainers <pkg-gnome-maintainers@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Sun, 26 Dec 2021 21:03:01 UTC Severity: important Tags: security, upstream Found i ...
Due to the use of the system command in the Magick-Load op used by gegl an attacker is able to craft a command line path that is able to lead to the execution of arbitrary shell commands that impacts availability, confidentiality and integrity (CVE-2021-45463) ...
Due to the use of the system command in the Magick-Load op used by gegl an attacker is able to craft a command line path that is able to lead to the execution of arbitrary shell commands that impacts availability, confidentiality and integrity ...