Lucene search

K
redhatcveRedhat.comRH:CVE-2022-44268
HistoryFeb 07, 2023 - 5:26 a.m.

CVE-2022-44268

2023-02-0705:26:28
redhat.com
access.redhat.com
103
imagemagick
information disclosure
vulnerability
png images
security policy

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N

EPSS

0.022

Percentile

89.6%

An information disclosure vulnerability was found in ImageMagick. This flaw allows an attacker to read arbitrary files from a server when parsing an image and happens when the program is parsing a PNG image. If ImageMagick has permission to read other arbitrary files, the resulting image could have been embedded with contents from another file on the machine after the parsing process.

Mitigation

To mitigate the issue, we recommend setting a security policy that is suitable for your local environment. Add this to your security policy (policy.xml):

<policy domain="path" rights="none" pattern="/etc/*"/>    

With above policy, you get:

$ magick logo: -set profile /etc/passwd logo.png  
magick: attempt to perform an operation not allowed by the security policy `/etc/passwd' @ error/blob.c/FileToBlob/1433.  

This can be as draconian as needed. Use /* as the path to prevent reading any file with an absolute path. You can also protect against relative paths:

<policy domain="path" rights="none" pattern="../*"/>  

(For more information, refer to the complete issue discussion in external references)

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N

EPSS

0.022

Percentile

89.6%