vendor:
ImageMagick
by:
Cristian 'void' Giustini
6.5
CVSS
MEDIUM
Arbitrary File Read
22
CWE
Product Name: ImageMagick
Affected Version From: 7.1.0-49
Affected Version To: 6.9.11-60
Patch Exists: YES
Related CWE: CVE-2022-44268
CPE: a:imagemagick:imagemagick
Metasploit:
https://www.rapid7.com/db/vulnerabilities/ubuntu-cve-2022-44268/, https://www.rapid7.com/db/vulnerabilities/debian-cve-2022-44268/, https://www.rapid7.com/db/vulnerabilities/amazon_linux-cve-2022-44268/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2022-44268/, https://www.rapid7.com/db/vulnerabilities/amazon-linux-ami-2-cve-2022-44268/
Platforms Tested: 7.1.0-49 and 6.9.11-60
2023
ImageMagick 7.1.0-49 – Arbitrary File Read
ImageMagick is vulnerable to an arbitrary file read vulnerability. This vulnerability allows an attacker to read any file on the system, including sensitive files such as /etc/passwd. The vulnerability is due to a lack of input validation when processing the '-read' option. An attacker can exploit this vulnerability by sending a specially crafted request to the ImageMagick server. The vulnerability affects versions 7.1.0-49 and 6.9.11-60 of ImageMagick. The pre-requirement for exploiting this vulnerability is Rust.
Mitigation:
The vendor has released a patch to address this vulnerability. Users should upgrade to the latest version of ImageMagick.