CVE-2016-3714
HIGH KEVImageMagick <6.9.3-10 & <7.0.1-1 - RCE
Title source: llmDescription
The (1) EPHEMERAL, (2) HTTPS, (3) MVG, (4) MSL, (5) TEXT, (6) SHOW, (7) WIN, and (8) PLT coders in ImageMagick before 6.9.3-10 and 7.x before 7.0.1-1 allow remote attackers to execute arbitrary code via shell metacharacters in a crafted image, aka "ImageTragick."
Exploits (9)
nomisec
WORKING POC
18 stars
by jpeanut · poc
https://github.com/jpeanut/ImageTragick-CVE-2016-3714-RShell
nomisec
WORKING POC
1 stars
by chusiang · poc
https://github.com/chusiang/CVE-2016-3714.ansible.role
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubylocalmultiple
https://www.exploit-db.com/exploits/39791
exploitdb
WORKING POC
by Nikolay Ermishkin · textdosmultiple
https://www.exploit-db.com/exploits/39767
References (31)
Scores
CVSS v3
8.4
EPSS
0.9375
EPSS Percentile
99.8%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Exploitation Intel
CISA KEV
2024-09-09
VulnCheck KEV
2016-05-04
InTheWild.io
2024-09-09
ENISA EUVD
EUVD-2016-4735
Classification
CWE
CWE-20
Status
draft
Affected Products (12)
imagemagick/imagemagick
< 6.9.3-9
imagemagick/imagemagick
imagemagick/imagemagick
canonical/ubuntu_linux
canonical/ubuntu_linux
canonical/ubuntu_linux
canonical/ubuntu_linux
debian/debian_linux
debian/debian_linux
opensuse/leap
opensuse/opensuse
suse/suse_linux_enterprise_server
Timeline
Published
May 05, 2016
KEV Added
Sep 09, 2024
Tracked Since
Feb 18, 2026