Welcome to the GoFuckYourself.com - Adult Webmaster Forum forums.

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. By joining our free community you will have access to post topics, communicate privately with other members (PM), respond to polls, upload content and access many other special features. Registration is fast, simple and absolutely free so please, join our community today!

If you have any problems with the registration process or your account login, please contact us.

Post New Thread Reply

Register GFY Rules Calendar
Go Back   GoFuckYourself.com - Adult Webmaster Forum > >
Discuss what's fucking going on, and which programs are best and worst. One-time "program" announcements from "established" webmasters are allowed.

 
Thread Tools
Old 06-01-2016, 07:47 PM   #1
sarettah
see you later, I'm gone
 
Industry Role:
Join Date: Oct 2002
Posts: 14,075
Imagemagick Remote Execution Vulnerabilities

I was at my PHP Users group these evening and during the intro (Last month in PHP) it was brought up that some vulnerabilities had been discovered in imagemagick.

I do not do much with imagemagick anymore but I know that there are people here that run scripts that use it. I have not seen this being discussed here so I decided to post it so you can be aware of it.

I am not sure of the technical details about the vulnerabilities other than they seem to have to do with user submitted images.

There is a page describing the issues at https://imagetragick.com/.

Here is what they say in the intro:

Quote:
There are multiple vulnerabilities in ImageMagick, a package commonly used by web services to process images. One of the vulnerabilities can lead to remote code execution (RCE) if you process user submitted images. The exploit for this vulnerability is being used in the wild.

A number of image processing plugins depend on the ImageMagick library, including, but not limited to, PHP?s imagick, Ruby?s rmagick and paperclip, and nodejs?s imagemagick.

If you use ImageMagick or an affected library, we recommend you mitigate the known vulnerabilities by doing at least one of these two things (but preferably both!):

Verify that all image files begin with the expected "magic bytes" corresponding to the image file types you support before sending them to ImageMagick for processing. (see FAQ for more info)

Use a policy file to disable the vulnerable ImageMagick coders. The global policy for ImageMagick is usually found in ?/etc/ImageMagick?. The below policy.xml example will disable the coders EPHEMERAL, URL, MVG, and MSL.......
Hope this helps someone.

.
__________________
All cookies cleared!
sarettah is online now   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 06-01-2016, 08:23 PM   #2
Bladewire
StraightBro
 
Bladewire's Avatar
 
Industry Role:
Join Date: Aug 2003
Location: Monarch Beach, CA USA
Posts: 56,229
Thanks for the heads up!
__________________


Skype: CallTomNow

Bladewire is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Post New Thread Reply
Go Back   GoFuckYourself.com - Adult Webmaster Forum > >

Bookmarks

Tags
imagemagick, vulnerabilities, images, image, php, library, process, file, execution, remote, submitted, user, processing, intro, coders, policy, disable, preferably, nodejs?s, affected, verify, paperclip, mitigate, rmagick, ruby?s



Advertising inquiries - marketing at gfy dot com

Contact Admin - Advertise - GFY Rules - Top

©2000-, AI Media Network Inc



Powered by vBulletin
Copyright © 2000- Jelsoft Enterprises Limited.