First published: Sun Apr 27 2014(Updated: )
Python Image Library (PIL) 1.1.7 and earlier and Pillow 2.3 might allow remote attackers to execute arbitrary commands via shell metacharacters in unspecified vectors related to CVE-2014-1932, possibly JpegImagePlugin.py.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
pip/pillow | <2.5.0 | 2.5.0 |
Python Imaging Library (Pillow) | =2.3.0 | |
Python Imaging Library (PIL) | <=1.1.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-3007 is classified as a high severity vulnerability due to the potential for remote command execution.
To fix CVE-2014-3007, you should upgrade Pillow to version 2.5.0 or later, or ensure you are using a non-vulnerable version of the Python Imaging Library.
CVE-2014-3007 affects Python Image Library (PIL) versions up to 1.1.7 and Pillow versions up to 2.3.
Yes, CVE-2014-3007 can be exploited remotely by attackers through shell metacharacters.
CVE-2014-3007 can enable attackers to execute arbitrary commands on affected systems.