CVE-2021-45463Improper Input Validation in Gegl

Severity
7.8HIGHNVD
EPSS
2.1%
top 16.06%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 23
Latest updateJul 27

Description

load_cache in GEGL before 0.4.34 allows shell expansion when a pathname in a constructed command line is not escaped or filtered. This is caused by use of the system library function for execution of the ImageMagick convert fallback in magick-load. NOTE: GEGL releases before 0.4.34 are used in GIMP releases before 2.10.30; however, this does not imply that GIMP builds enable the vulnerable feature.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages3 packages

NVDgegl/gegl< 0.4.34
NVDgimp/gimp< 2.10.30
Debiangegl/gegl< 1:0.4.26-2+deb11u1+3

Also affects: Fedora 34, 35, Enterprise Linux 7.0, 8.0

Patches

🔴Vulnerability Details

3
GHSA
GHSA-g9gv-9646-jvp8: GEGL before 02021-12-24
OSV
CVE-2021-45463: load_cache in GEGL before 02021-12-23
CVEList
CVE-2021-45463: load_cache in GEGL before 02021-12-23

📋Vendor Advisories

3
Ubuntu
GEGL vulnerability2022-07-27
Red Hat
gegl: shell expansion via a crafted pathname2021-12-15
Debian
CVE-2021-45463: gegl - load_cache in GEGL before 0.4.34 allows shell expansion when a pathname in a con...2021
CVE-2021-45463 — Improper Input Validation in Gegl | cvebase