简体   繁体   中英

Is the PECL imagick extension also vulnerable to the new ImageMagick security issue?

I'm asking, if the PECL imagick extension is also vulnerable to the new very critical ImageMagick security issue (check here and here ). Is the extension just using the ImageMagick tool via shell, too?

yes.

The Imagick PECL is a PHP binding to the C-API MagickWand . It does not invoke a shell session, but is vulnerable to the delegate security issues -- just the same.

Update the policy.xml as recommended by the notice.

edit for completion

How to updated policy.xml (YMMV)

  • Locate ImageMagick's shared path on system.

     $ identify -list configure | grep SHARE #=> SHARE_PATH /usr/share/ImageMagick-6 
  • Create or edit policy.xml in directory of previous step.

     $ cd /usr/share/ImageMagick-6 $ sudo cat > policy.xml <<EOF <policymap> <policy domain="coder" rights="none" pattern="EPHEMERAL" /> <policy domain="coder" rights="none" pattern="HTTPS" /> <policy domain="coder" rights="none" pattern="MVG" /> <policy domain="coder" rights="none" pattern="MSL" /> <policy domain="coder" rights="none" pattern="TEXT" /> <policy domain="coder" rights="none" pattern="SHOW" /> <policy domain="coder" rights="none" pattern="WIN" /> <policy domain="coder" rights="none" pattern="PLT" /> </policymap> EOF 
  • Verify policy loads with identify -list policy .

  • Restart web-services to ensure new policies are loaded.

The technical post webpages of this site follow the CC BY-SA 4.0 protocol. If you need to reprint, please indicate the site URL or the original address.Any question please contact:yoyou2525@163.com.

 
粤ICP备18138465号  © 2020-2024 STACKOOM.COM