CVE-2023-50447
ADVISORY - githubSummary
Pillow through 10.1.0 allows PIL.ImageMath.eval Arbitrary Code Execution via the environment parameter, a different vulnerability than CVE-2022-22817 (which was about the expression parameter).
EPSS Score: 0.00557 (0.673)
Common Weakness Enumeration (CWE)
ADVISORY - nist
ADVISORY - github
ADVISORY - gitlab
OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities
OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities
Improper Control of Generation of Code ('Code Injection')
Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')
ADVISORY - redhat
Improper Neutralization of Special Elements used in a Command ('Command Injection')
Sign in to Docker Scout
See which of your images are affected by this CVE and how to fix them by signing into Docker Scout.
Sign in