Hello, Sorry for being off-topic, but as the maintainer for the Imagick extension I feel it necessary to do my best impression of Paul Revere* and warn people of an alleged vulnerability in the underlying ImageMagick library.
Apparently servers that use ImageMagick to process any user uploaded images are vulnerable to a remote code execution attack. Ways to mitigate this vulnerability are at: https://imagetragick.com/ which include: ####### Verify that all image files begin with the expected "magic bytes" corresponding to the image file types you support before sending them to ImageMagick for processing. Use a policy file to disable the vulnerable ImageMagick coders. The global policy for ImageMagick is usually found in “/etc/ImageMagick”. The below policy.xml example will disable the coders EPHEMERAL, URL, MVG, and MSL. <policymap> <policy domain="coder" rights="none" pattern="EPHEMERAL" /> <policy domain="coder" rights="none" pattern="URL" /> <policy domain="coder" rights="none" pattern="HTTPS" /> <policy domain="coder" rights="none" pattern="MVG" /> <policy domain="coder" rights="none" pattern="MSL" /> </policymap> ####### I believe restarting any PHP process that would have loaded the Imagick extension is required to ensure this mitigation takes effect. For the record, I do not know any more details about the vulnerability. Nor do I believe there are any mitigation step that could or should be taken in the Imagick extension code. As an aside, I do recommend only processing images in a locked down 'background worker' process, rather directly in the web server; I'm not sure if that would help in for this particular vulnerability, but it is usually a good idea. cheers Dan Ack * https://twitter.com/MrDanack/status/727623821860216832 -- PHP Internals - PHP Runtime Development Mailing List To unsubscribe, visit: http://www.php.net/unsub.php