PyPi: Exiv2

CVE-2023-44398

Transitive

Safety vulnerability ID: 63186

This vulnerability was reviewed by experts

The information on this page was manually curated by our Cybersecurity Intelligence Team.

Created at Nov 06, 2023 Updated at Sep 19, 2024
Scan your Python projects for vulnerabilities →

Advisory

Exiv2 (Python bindings to exiv2 C++ library) 0.15.0 and 0.14.1 ship with libexiv2 version 0.28.0, which is affected by CVE-2023-44398: An out-of-bounds write was found in Exiv2 version v0.28.0. The vulnerable function, 'BmffImage::brotliUncompress', is new in v0.28.0, so earlier versions of Exiv2 are _not_ affected. The out-of-bounds write is triggered when Exiv2 is used to read the metadata of a crafted image file. An attacker could potentially exploit the vulnerability to gain code execution, if they can trick the victim into running Exiv2 on a crafted image file.
https://github.com/jim-easterbrook/python-exiv2/commit/61c1365e4fcd09aaf391ad1d8435d9fab0715db7
https://github.com/Exiv2/exiv2/security/advisories/GHSA-hrw9-ggg3-3r4r

Affected package

exiv2

Latest version: 0.17.1

Python interface to libexiv2

Affected versions

Fixed versions

Vulnerability changelog

This vulnerability has no description

Resources

Use this package?

Scan your Python project for dependency vulnerabilities in two minutes

Scan your application

Severity Details

CVSS Base Score

HIGH 8.8

CVSS v3 Details

HIGH 8.8
Attack Vector (AV)
NETWORK
Attack Complexity (AC)
LOW
Privileges Required (PR)
NONE
User Interaction (UI)
REQUIRED
Scope (S)
UNCHANGED
Confidentiality Impact (C)
HIGH
Integrity Impact (I)
HIGH
Availability Availability (A)
HIGH