Hi Dan,

On Wed, May 4, 2016 at 7:33 AM, Dan Ackroyd <dan...@basereality.com> wrote:
> Sorry for being off-topic, but as the maintainer for the Imagick
> extension I feel it necessary to do my best impression of Paul Revere*
> and warn people of an alleged vulnerability in the underlying
> ImageMagick library.

Not at all.
Thank you for letting us know!

Regards,

--
Yasuo Ohgaki
yohg...@ohgaki.net

>
> Apparently servers that use ImageMagick to process any user uploaded
> images are vulnerable to a remote code execution attack. Ways to
> mitigate this vulnerability are at: https://imagetragick.com/ which
> include:
>
> #######
>
> Verify that all image files begin with the expected "magic bytes"
> corresponding to the image file types you support before sending them
> to ImageMagick for processing.
>
> Use a policy file to disable the vulnerable ImageMagick coders. The
> global policy for ImageMagick is usually found in “/etc/ImageMagick”.
> The below policy.xml example will disable the coders EPHEMERAL, URL,
> MVG, and MSL.
>
> <policymap>
>   <policy domain="coder" rights="none" pattern="EPHEMERAL" />
>   <policy domain="coder" rights="none" pattern="URL" />
>   <policy domain="coder" rights="none" pattern="HTTPS" />
>   <policy domain="coder" rights="none" pattern="MVG" />
>   <policy domain="coder" rights="none" pattern="MSL" />
> </policymap>
>
> #######
>
> I believe restarting any PHP process that would have loaded the
> Imagick extension is required to ensure this mitigation takes effect.
>
> For the record, I do not know any more details about the
> vulnerability. Nor do I believe there are any mitigation step that
> could or should be taken in the Imagick extension code.
>
> As an aside, I do recommend only processing images in a locked down
> 'background worker' process, rather directly in the web server; I'm
> not sure if that would help in for this particular vulnerability, but
> it is usually a good idea.

--
PHP Internals - PHP Runtime Development Mailing List
To unsubscribe, visit: http://www.php.net/unsub.php

Reply via email to