Vulnerability Details : CVE-2016-3718
The (1) HTTP and (2) FTP coders in ImageMagick before 6.9.3-10 and 7.x before 7.0.1-1 allow remote attackers to conduct server-side request forgery (SSRF) attacks via a crafted image.
Vulnerability category: Server-side request forgery (SSRF) Input validation
CVE-2016-3718 is in the CISA Known Exploited Vulnerabilities Catalog
CISA vulnerability name:
ImageMagick Server-Side Request Forgery (SSRF) Vulnerability
CISA required action:
Apply updates per vendor instructions.
CISA description:
ImageMagick contains an unspecified vulnerability that allows attackers to perform server-side request forgery (SSRF) via a crafted image.
Added on
2021-11-03
Action due date
2022-05-03
Exploit prediction scoring system (EPSS) score for CVE-2016-3718
Probability of exploitation activity in the next 30 days: 92.90%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 99 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2016-3718
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:N/I:P/A:N |
8.6
|
2.9
|
NIST |
6.3
|
MEDIUM | CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N |
1.8
|
4.0
|
NIST |
CWE ids for CVE-2016-3718
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: nvd@nist.gov (Primary)
References for CVE-2016-3718
-
http://www.ubuntu.com/usn/USN-2990-1
USN-2990-1: ImageMagick vulnerabilities | Ubuntu security noticesThird Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00051.html
[security-announce] openSUSE-SU-2016:1326-1: important: Security update
-
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.440568
The Slackware Linux Project: Slackware Security Advisories
-
http://git.imagemagick.org/repos/ImageMagick/blob/a01518e08c840577cabd7d3ff291a9ba735f7276/ChangeLog
503 Service UnavailablePatch;Vendor Advisory
-
http://rhn.redhat.com/errata/RHSA-2016-0726.html
RHSA-2016:0726 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
Oracle Solaris Bulletin - July 2016
-
https://www.imagemagick.org/discourse-server/viewtopic.php?f=4&t=29588
ImageMagick Security Issue - ImageMagickVendor Advisory
-
https://www.exploit-db.com/exploits/39767/
ImageMagick 7.0.1-0 / 6.9.3-9 - 'ImageTragick ' Multiple Vulnerabilities
-
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00024.html
[security-announce] SUSE-SU-2016:1260-1: important: Security update for
-
http://www.openwall.com/lists/oss-security/2016/05/03/18
oss-security - Re: ImageMagick Is On Fire -- CVE-2016-3714Mailing List;Third Party Advisory
-
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
Oracle Linux Bulletin - April 2016
-
https://www.imagemagick.org/script/changelog.php
ImageMagick - ChangelogRelease Notes
-
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00025.html
[security-announce] openSUSE-SU-2016:1261-1: important: Security update
-
https://lists.debian.org/debian-lts-announce/2018/06/msg00009.html
[SECURITY] [DLA 1401-1] graphicsmagick security update
-
https://security.gentoo.org/glsa/201611-21
ImageMagick: Multiple vulnerabilities (GLSA 201611-21) — Gentoo security
-
http://www.debian.org/security/2016/dsa-3580
Debian -- Security Information -- DSA-3580-1 imagemagick
-
http://www.securityfocus.com/archive/1/538378/100/0/threaded
SecurityFocus
-
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00028.html
[security-announce] openSUSE-SU-2016:1266-1: important: Security update
-
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00032.html
[security-announce] SUSE-SU-2016:1275-1: important: Security update for
Products affected by CVE-2016-3718
- cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_hpc_node:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*
- cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*
- cpe:2.3:a:imagemagick:imagemagick:7.0.1-0:*:*:*:*:*:*:*
- cpe:2.3:a:imagemagick:imagemagick:7.0.0-0:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*