{"id":"CVE-2020-29599","details":"ImageMagick before 6.9.11-40 and 7.x before 7.0.10-40 mishandles the -authenticate option, which allows setting a password for password-protected PDF files. The user-controlled password was not properly escaped/sanitized and it was therefore possible to inject additional shell commands via coders/pdf.c.","modified":"2026-05-15T12:03:45.302516757Z","published":"2020-12-07T20:15:12.773Z","related":["SUSE-SU-2021:0153-1","SUSE-SU-2021:0156-1","openSUSE-SU-2021:0136-1","openSUSE-SU-2021:0148-1"],"database_specific":{"unresolved_ranges":[{"cpes":["cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"],"vendor_product":"debian:debian_linux","source":"CPE_FIELD","extracted_events":[{"last_affected":"9.0"}]}]},"references":[{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2023/03/msg00008.html"},{"type":"ADVISORY","url":"https://insert-script.blogspot.com/2020/11/imagemagick-shell-injection-via-pdf.html"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2021/01/msg00010.html"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202101-36"},{"type":"EVIDENCE","url":"https://github.com/ImageMagick/ImageMagick/discussions/2851"}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}