Search found 5 matches
- 2016-05-07T04:17:31-07:00
- Forum: Developers
- Topic: CentOS 6 Question...
- Replies: 1
- Views: 3940
Re: CentOS 6 Question...
Given what you've checked I'd say you are safe in concluding that ImageMagick isn't installed on the system.
- 2016-05-07T03:58:44-07:00
- Forum: Developers
- Topic: Is there a work around for RHEL 5 concerning the Imagemagic Security vulnerability
- Replies: 23
- Views: 35804
Re: Is there a work around for RHEL 5 concerning the Imagemagic Security vulnerability
Just by way of an update, I was able to replicate all the exploits listed on https://imagetragick.com/ on CentOS7, and all with the exception of the epehmeral:/ delete on RHEL5 & CentOS5 and have deployed the mitigations below to all my systems with no issues, other than the loss of SVG thumbnailing ...
- 2016-05-05T02:02:02-07:00
- Forum: Developers
- Topic: Is there a work around for RHEL 5 concerning the Imagemagic Security vulnerability
- Replies: 23
- Views: 35804
Re: Is there a work around for RHEL 5 concerning the Imagemagic Security vulnerability
Based on the existence of an 'msl.so' on CentOS v5 it looks like MSL would be an issue too, for now I'm going to chmod 000 all of mvg.so, msl.so, url.so and label.so
- 2016-05-05T00:35:23-07:00
- Forum: Developers
- Topic: Is there a work around for RHEL 5 concerning the Imagemagic Security vulnerability
- Replies: 23
- Views: 35804
Re: Is there a work around for RHEL 5 concerning the Imagemagic Security vulnerability
Looks like MVG (and label) can be disabled on CentOSv5 by denying access to (or I guess removing / renaming) the coder plugin file(s):
chmod -v 000 /usr/lib*/ImageMagick-*/modules-*/coders/mvg.so
'label' and 'svg' can be disabled in the same way too.
chmod -v 000 /usr/lib*/ImageMagick-*/modules-*/coders/mvg.so
'label' and 'svg' can be disabled in the same way too.
- 2016-05-04T23:43:07-07:00
- Forum: Developers
- Topic: Is there a work around for RHEL 5 concerning the Imagemagic Security vulnerability
- Replies: 23
- Views: 35804
Re: Is there a work around for RHEL 5 concerning the Imagemagic Security vulnerability
The remote command execution via 'HTTPS' appears to be able to be mitigated on RHEL/CentOS v5 by updating the delegates.xml eg changing the following line in /usr/lib64/ImageMagick-6.2.8/config/delegates.xml (CentOS 5 path) <delegate decode="https" command='"wget" -q -O "%o" "https:%M"' /> to ...