This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Horde First view 2017-06-21
Product Horde Image Api Last view 2017-09-21
Version 2.2.0 Type Application
Update *  
Edition *  
Language *  
Sofware Edition *  
Target Software *  
Target Hardware *  
Other *  
 
CPE Product cpe:2.3:a:horde:horde_image_api

Activity : Overall

Related : CVE

  Date Alert Description
8.1 2017-09-21 CVE-2017-14650

A Remote Code Execution vulnerability has been found in the Horde_Image library when using the "Im" backend that utilizes ImageMagick's "convert" utility. It's not exploitable through any Horde application, because the code path to the vulnerability is not used by any Horde code. Custom applications using the Horde_Image library might be affected. This vulnerability affects all versions of Horde_Image from 2.0.0 to 2.5.1, and is fixed in 2.5.2. The problem is missing input validation of the index field in _raw() during construction of an ImageMagick command line.

8.8 2017-06-21 CVE-2017-9774

Remote Code Execution was found in Horde_Image 2.x before 2.5.0 via a crafted GET request. Exploitation requires authentication.

CWE : Common Weakness Enumeration

%idName
50% (1) CWE-94 Failure to Control Generation of Code ('Code Injection')
50% (1) CWE-20 Improper Input Validation

Nessus® Vulnerability Scanner

id Description
2018-08-20 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-4276.nasl - Type: ACT_GATHER_INFO
2018-06-25 Name: The remote Debian host is missing a security update.
File: debian_DLA-1395.nasl - Type: ACT_GATHER_INFO
2017-07-17 Name: The remote Fedora host is missing a security update.
File: fedora_2017-28387b61fd.nasl - Type: ACT_GATHER_INFO
2017-07-13 Name: The remote Fedora host is missing a security update.
File: fedora_2017-299525e757.nasl - Type: ACT_GATHER_INFO
2017-07-06 Name: The remote Fedora host is missing a security update.
File: fedora_2017-6f7d6fbccc.nasl - Type: ACT_GATHER_INFO
2017-06-22 Name: The remote FreeBSD host is missing a security-related update.
File: freebsd_pkg_a700312156bf11e78e6608606e46faad.nasl - Type: ACT_GATHER_INFO