Jump to content

another ImageMagick vulnerability

Recommended Posts


All existing releases of GraphicsMagick and ImageMagick support a file open syntax where if the first character of the file specification is a '|', then the remainder of the filename is passed to the shell for execution using the POSIX popen(3C) function. File opening is handled by an OpenBlob() function in the source file blob.c. Unlike the vulnerability described by CVE-2016-3714, this functionality is supported by the core file opening function rather than a delegates subsystem usually used to execute external programs.

ImageMagick-7 : http://git.imagemagick.org/repos/Ima...4f0921abc61458
ImageMagick-6 : http://git.imagemagick.org/repos/Ima...fc463b50c2c6b7

Link to comment
Share on other sites


This topic is now archived and is closed to further replies.

  • Recently Browsing   0 members

    • No registered users viewing this page.
  • Create New...