The (1) HTTP and (2) FTP coders in ImageMagick before 6.9.3-10 and 7.x before 7.0.1-1 allow remote attackers to conduct server-side request forgery (SSRF) attacks via a crafted image.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
History
22 Oct 2025, 00:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
21 Oct 2025, 20:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
21 Oct 2025, 19:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
21 Nov 2024, 02:50
| Type | Values Removed | Values Added |
|---|---|---|
| References | () http://git.imagemagick.org/repos/ImageMagick/blob/a01518e08c840577cabd7d3ff291a9ba735f7276/ChangeLog - Patch, Vendor Advisory | |
| References | () http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00024.html - Third Party Advisory | |
| References | () http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00025.html - Third Party Advisory | |
| References | () http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00028.html - Third Party Advisory | |
| References | () http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00032.html - Third Party Advisory | |
| References | () http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00051.html - Third Party Advisory | |
| References | () http://rhn.redhat.com/errata/RHSA-2016-0726.html - Third Party Advisory | |
| References | () http://www.debian.org/security/2016/dsa-3580 - Mailing List, Third Party Advisory | |
| References | () http://www.openwall.com/lists/oss-security/2016/05/03/18 - Mailing List, Third Party Advisory | |
| References | () http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html - Third Party Advisory | |
| References | () http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html - Third Party Advisory | |
| References | () http://www.securityfocus.com/archive/1/538378/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry | |
| References | () http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.440568 - Third Party Advisory | |
| References | () http://www.ubuntu.com/usn/USN-2990-1 - Third Party Advisory | |
| References | () https://lists.debian.org/debian-lts-announce/2018/06/msg00009.html - Mailing List, Third Party Advisory | |
| References | () https://security.gentoo.org/glsa/201611-21 - Third Party Advisory | |
| References | () https://www.exploit-db.com/exploits/39767/ - Third Party Advisory, VDB Entry | |
| References | () https://www.imagemagick.org/discourse-server/viewtopic.php?f=4&t=29588 - Vendor Advisory | |
| References | () https://www.imagemagick.org/script/changelog.php - Release Notes |
24 Jul 2024, 17:05
| Type | Values Removed | Values Added |
|---|---|---|
| References | () http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00024.html - Third Party Advisory | |
| References | () http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00025.html - Third Party Advisory | |
| References | () http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00028.html - Third Party Advisory | |
| References | () http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00032.html - Third Party Advisory | |
| References | () http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00051.html - Third Party Advisory | |
| References | () http://www.debian.org/security/2016/dsa-3580 - Mailing List, Third Party Advisory | |
| References | () http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html - Third Party Advisory | |
| References | () http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html - Third Party Advisory | |
| References | () http://www.securityfocus.com/archive/1/538378/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry | |
| References | () http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.440568 - Third Party Advisory | |
| References | () https://lists.debian.org/debian-lts-announce/2018/06/msg00009.html - Mailing List, Third Party Advisory | |
| References | () https://security.gentoo.org/glsa/201611-21 - Third Party Advisory | |
| References | () https://www.exploit-db.com/exploits/39767/ - Third Party Advisory, VDB Entry | |
| First Time |
Oracle
Opensuse opensuse Suse manager Proxy Redhat enterprise Linux Eus Suse manager Oracle linux Suse Oracle solaris Suse linux Enterprise Software Development Kit Suse linux Enterprise Server Redhat enterprise Linux For Ibm Z Systems Redhat enterprise Linux For Power Little Endian Eus Suse linux Enterprise Desktop Redhat enterprise Linux For Power Little Endian Suse linux Enterprise Debuginfo Redhat enterprise Linux Server From Rhui Suse linux Enterprise Workstation Extension Redhat enterprise Linux Server Tus Redhat enterprise Linux For Ibm Z Systems Eus Opensuse leap Redhat enterprise Linux For Power Big Endian Suse openstack Cloud Redhat enterprise Linux For Power Big Endian Eus Opensuse |
|
| CWE | CWE-918 | |
| CVSS |
v2 : v3 : |
v2 : 4.3
v3 : 5.5 |
| CPE | cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:* |
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.7_s390x:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.7_ppc64le:*:*:*:*:*:*:* cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.4_ppc64:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.4_ppc64le:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:6.7_s390x:*:*:*:*:*:*:* cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.3_s390x:*:*:*:*:*:*:* cpe:2.3:a:suse:openstack_cloud:5:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.6_ppc64:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.2_ppc64le:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:6.0_s390x:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_from_rhui:6.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:* cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp3:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:* cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.6_ppc64le:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.4_s390x:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.0_s390x:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.2_s390x:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:* cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:-:*:*:*:*:*:* cpe:2.3:a:suse:manager:2.1:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.5_ppc64:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:6.0_ppc64:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.7_ppc64:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.3_ppc64:*:*:*:*:*:*:* cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:sp1:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.6_s390x:*:*:*:*:*:*:* cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.5_s390x:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.3_ppc64le:*:*:*:*:*:*:* cpe:2.3:a:suse:manager_proxy:2.1:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.5_ppc64le:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_from_rhui:7.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:6.7_ppc64:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:ltss:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0_ppc64:*:*:*:*:*:*:* cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:7.0_ppc64le:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.2_ppc64:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:* cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp2:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:* |
Information
Published : 2016-05-05 18:59
Updated : 2025-10-22 00:15
NVD link : CVE-2016-3718
Mitre link : CVE-2016-3718
CVE.ORG link : CVE-2016-3718
JSON object : View
Products Affected
redhat
- enterprise_linux_for_ibm_z_systems
- enterprise_linux_desktop
- enterprise_linux_workstation
- enterprise_linux_eus
- enterprise_linux_server
- enterprise_linux_hpc_node
- enterprise_linux_for_ibm_z_systems_eus
- enterprise_linux_server_from_rhui
- enterprise_linux_server_supplementary_eus
- enterprise_linux_server_tus
- enterprise_linux_for_power_little_endian
- enterprise_linux_hpc_node_eus
- enterprise_linux_for_power_big_endian
- enterprise_linux_server_aus
- enterprise_linux_for_power_big_endian_eus
- enterprise_linux_for_power_little_endian_eus
canonical
- ubuntu_linux
opensuse
- leap
- opensuse
oracle
- solaris
- linux
suse
- linux_enterprise_desktop
- manager_proxy
- openstack_cloud
- linux_enterprise_workstation_extension
- linux_enterprise_software_development_kit
- manager
- linux_enterprise_debuginfo
- linux_enterprise_server
imagemagick
- imagemagick
CWE
CWE-918
Server-Side Request Forgery (SSRF)
