Menu
Critical flaws in ImageMagick library expose websites to hacking

Critical flaws in ImageMagick library expose websites to hacking

The flaws can be exploited through specially crafted images to execute malicious code on Web servers

A tool used by millions of websites to process images has several critical vulnerabilities that could allow attackers to compromise Web servers. To make things worse, there's no official patch yet and exploits are already available.

The vulnerabilities were discovered by Nikolay Ermishkin from the Mail.Ru security team and were reported to the ImageMagick developers who attempted a fix in version 6.9.3-9, released on April 30. However, the fix is incomplete and the vulnerabilities can still be exploited.

Furthermore, there is evidence that people aside from security researchers and  ImageMagick developers know about the flaws, which is why their existence was publicly disclosed Tuesday. The flaws can be exploited by uploading specially crafted images to Web applications that rely on ImageMagick to process them.

ImageMagick is a command-line tool that can be used to create, edit and convert a large number of image file formats. Its library is the base for other Web server packages like PHP’s imagick, Ruby’s rmagick and papercli and Node.js’s imagemagick.

Since the public disclosure Tuesday, security researchers have already developed proof-of-concept exploits for the issues. This means that attackers could too, increasing the likelihood of malicious in-the-wild attacks.

Security researchers have dubbed the set of flaws ImageTragick and created a website with more information for website developers and administrators, including mitigation advice until a complete patch is made available.

"Verify that all image files begin with the expected 'magic bytes' corresponding to the image file types you support before sending them to ImageMagick for processing," the researchers said on the website. "Use a policy file to disable the vulnerable ImageMagick coders. The global policy for ImageMagick is usually found in '/etc/ImageMagick'."

The ImageMagick developers have also suggested the policy-based mitigation and posted an example policy file on their support forum.


Follow Us

Join the New Zealand Reseller News newsletter!

Error: Please check your email address.

Featured

Slideshows

Tight lines as Hooked on Lenovo catches up at Great Barrier Island

Tight lines as Hooked on Lenovo catches up at Great Barrier Island

​Ingram Micro’s Hooked on Lenovo incentive programme recently rewarded 28 of New Zealand's top performing resellers with a full-on fishing trip at Great Barrier Island for the third year​ in a row.

Tight lines as Hooked on Lenovo catches up at Great Barrier Island
Inside the AWS Summit in Sydney

Inside the AWS Summit in Sydney

As the dust settles on the 2017 AWS Summit in Sydney, ARN looks back an action packed two-day event, covering global keynote presentations, 80 breakout sessions on the latest technology solutions, and channel focused tracks involving local cloud stories and insights.

Inside the AWS Summit in Sydney
Channel tees off on the North Shore as Ingram Micro hosts annual Cure Kids Charity golf day

Channel tees off on the North Shore as Ingram Micro hosts annual Cure Kids Charity golf day

Ingram Micro hosted its third annual Cure Kids Charity Golf Tournament at the North Shore Golf Club in Auckland. In total, 131 resellers, vendors and Ingram Micro suppliers enjoyed a round of golf consisting of challenges on each of the 18 sponsored holes, with Team Philips taking out the top honours.

Channel tees off on the North Shore as Ingram Micro hosts annual Cure Kids Charity golf day
Show Comments