header-logo
Suggest Exploit
vendor:
ImageMagick
by:
Cristian 'void' Giustini
6.5
CVSS
MEDIUM
Arbitrary File Read
22
CWE
Product Name: ImageMagick
Affected Version From: 7.1.0-49
Affected Version To: 6.9.11-60
Patch Exists: YES
Related CWE: CVE-2022-44268
CPE: a:imagemagick:imagemagick
Other Scripts:
Platforms Tested: 7.1.0-49 and 6.9.11-60
2023

ImageMagick 7.1.0-49 – Arbitrary File Read

ImageMagick is vulnerable to an arbitrary file read vulnerability. This vulnerability allows an attacker to read any file on the system, including sensitive files such as /etc/passwd. The vulnerability is due to a lack of input validation when processing the '-read' option. An attacker can exploit this vulnerability by sending a specially crafted request to the ImageMagick server. The vulnerability affects versions 7.1.0-49 and 6.9.11-60 of ImageMagick. The pre-requirement for exploiting this vulnerability is Rust.

Mitigation:

The vendor has released a patch to address this vulnerability. Users should upgrade to the latest version of ImageMagick.
Source

Exploit-DB raw data:

# Exploit Title: ImageMagick  7.1.0-49 - Arbitrary File Read
# Google Dork: N/A
# Date: 06/02/2023
# Exploit Author: Cristian 'void' Giustini
# Vendor Homepage: https://imagemagick.org/
# Software Link: https://imagemagick.org/
# Version: <= 7.1.0-49
# Tested on: 7.1.0-49 and 6.9.11-60
# CVE : CVE-2022-44268 (CVE Owner: Metabase Q Team
https://www.metabaseq.com/imagemagick-zero-days/)
# Exploit pre-requirements: Rust


# PoC : https://github.com/voidz0r/CVE-2022-44268