CVE-2017-14650

EUVD-2017-6150
A Remote Code Execution vulnerability has been found in the Horde_Image library when using the "Im" backend that utilizes ImageMagick's "convert" utility. It's not exploitable through any Horde application, because the code path to the vulnerability is not used by any Horde code. Custom applications using the Horde_Image library might be affected. This vulnerability affects all versions of Horde_Image from 2.0.0 to 2.5.1, and is fixed in 2.5.2. The problem is missing input validation of the index field in _raw() during construction of an ImageMagick command line.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
8.1 HIGH
NETWORK
HIGH
NONE
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 86%
Affected Products (NVD)
VendorProductVersion
hordehorde_image_api
2.0.0
hordehorde_image_api
2.0.0:alpha1
hordehorde_image_api
2.0.0:beta1
hordehorde_image_api
2.0.0:beta2
hordehorde_image_api
2.0.1
hordehorde_image_api
2.0.2
hordehorde_image_api
2.0.3
hordehorde_image_api
2.0.4
hordehorde_image_api
2.0.5
hordehorde_image_api
2.0.6
hordehorde_image_api
2.0.7
hordehorde_image_api
2.0.8
hordehorde_image_api
2.0.9
hordehorde_image_api
2.1.0
hordehorde_image_api
2.2.0
hordehorde_image_api
2.3.0
hordehorde_image_api
2.3.1
hordehorde_image_api
2.3.2
hordehorde_image_api
2.3.3
hordehorde_image_api
2.3.4
hordehorde_image_api
2.3.5
hordehorde_image_api
2.3.6
hordehorde_image_api
2.4.0
hordehorde_image_api
2.4.1
hordehorde_image_api
2.5.0
hordehorde_image_api
2.5.1
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
php-horde-image
bookworm
2.6.1-2
fixed
bullseye
2.6.1-2
fixed
sid
2.6.1-2
fixed
trixie
2.6.1-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
php-horde-image
artful
ignored
bionic
not-affected
cosmic
not-affected
disco
not-affected
eoan
not-affected
focal
dne
groovy
dne
hirsute
dne
impish
dne
jammy
dne
mantic
dne
noble
dne
trusty
dne
xenial
needed
zesty
ignored