Menu
Critical flaws in ImageMagick library expose websites to hacking

Critical flaws in ImageMagick library expose websites to hacking

The flaws can be exploited through specially crafted images to execute malicious code on Web servers

A tool used by millions of websites to process images has several critical vulnerabilities that could allow attackers to compromise Web servers. To make things worse, there's no official patch yet and exploits are already available.

The vulnerabilities were discovered by Nikolay Ermishkin from the Mail.Ru security team and were reported to the ImageMagick developers who attempted a fix in version 6.9.3-9, released on April 30. However, the fix is incomplete and the vulnerabilities can still be exploited.

Furthermore, there is evidence that people aside from security researchers and  ImageMagick developers know about the flaws, which is why their existence was publicly disclosed Tuesday. The flaws can be exploited by uploading specially crafted images to Web applications that rely on ImageMagick to process them.

ImageMagick is a command-line tool that can be used to create, edit and convert a large number of image file formats. Its library is the base for other Web server packages like PHP’s imagick, Ruby’s rmagick and papercli and Node.js’s imagemagick.

Since the public disclosure Tuesday, security researchers have already developed proof-of-concept exploits for the issues. This means that attackers could too, increasing the likelihood of malicious in-the-wild attacks.

Security researchers have dubbed the set of flaws ImageTragick and created a website with more information for website developers and administrators, including mitigation advice until a complete patch is made available.

"Verify that all image files begin with the expected 'magic bytes' corresponding to the image file types you support before sending them to ImageMagick for processing," the researchers said on the website. "Use a policy file to disable the vulnerable ImageMagick coders. The global policy for ImageMagick is usually found in '/etc/ImageMagick'."

The ImageMagick developers have also suggested the policy-based mitigation and posted an example policy file on their support forum.


Follow Us

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Featured

Slideshows

Reseller News launches new-look Awards at 2018 Judges’ Lunch

Reseller News launches new-look Awards at 2018 Judges’ Lunch

Introducing the Reseller News Innovation Awards, launched to the channel at the 2018 Judges’ Lunch in Auckland. With more than 70 judges now part of the voting panel, the new-look awards will reflect the changing dynamics of the channel, recognising excellence across customer value and innovation - spanning start-ups, partners, distributors and vendors.

Reseller News launches new-look Awards at 2018 Judges’ Lunch
Kiwi channel debates GDPR as Reseller News Exchange hits Wellington

Kiwi channel debates GDPR as Reseller News Exchange hits Wellington

This exclusive Reseller News Exchange, in association with Arrow ECS ANZ, ForeScout and StorageCraft, went on the road to debate the early implications of GDPR in New Zealand, extracting opportunities while evaluating challenges for the channel in the year ahead.

Kiwi channel debates GDPR as Reseller News Exchange hits Wellington
Show Comments