Arbitrary code execution vulnerability in Python Imaging Library (PIL) and Pillow via unspecified vectorsID: oval:org.secpod.oval:def:23619 | Date: (C)2015-02-27 (M)2023-10-26 |
Class: VULNERABILITY | Family: unix |
The host is installed with Python Image Library (PIL) 1.1.7 and earlier and Pillow 2.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle shell metacharacters in unspecified vectors related to CVE-2014-1932, possibly JpegImagePlugin.py. Successful exploitation allows remote attackers to execute arbitrary commands.
Platform: |
Red Hat Enterprise Linux 6 |
Red Hat Enterprise Linux 7 |
Red Hat Enterprise Linux 5 |
Product: |
python-imaging |
python-pillow |