ImageMagick Image Parsing Vulnerabilities including CVE-2016-3714 (Remote Code Execution), CVE-2016-3715, CVE-2016-3716, CVE-2016-3717 and CVE-2016-3718

This issue belongs to an archived project. You can view it, but you can't modify it. Learn more

XMLWordPrintable

      HipChat Server used a vulnerable version of the ImageMagick library without restricting coders. Attackers who can log in can use the ImageMagick vulnerabilities in vulnerable versions of HipChat Server to:

      • Execute remote code of their choice
      • Delete files that the www-data user has permission to delete
      • Move files that the www-data user has permission to move
      • Read files that the www-data user has permission to read
      • Make http requests to local and internal services

      To exploit this issue, attackers need to have a valid account in a vulnerable HipChat Server instance.

      Affected versions:

      • All versions of HipChat Server before version 2.0 build 1.4.1 are vulnerable.


      Fix:

      • Upgrade HipChat Server to version 2.0 build 1.4.1 or higher by following the instructions found at Upgrading HipChat Server.

      For additional details see the full advisory.

            Assignee:
            Unassigned
            Reporter:
            David Black
            Archiver:
            Michael Andreacchio

              Created:
              Updated:
              Resolved:
              Archived: