CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
EPSS
Percentile
89.6%
An information disclosure vulnerability was found in ImageMagick. This flaw allows an attacker to read arbitrary files from a server when parsing an image and happens when the program is parsing a PNG image. If ImageMagick has permission to read other arbitrary files, the resulting image could have been embedded with contents from another file on the machine after the parsing process.
To mitigate the issue, we recommend setting a security policy that is suitable for your local environment. Add this to your security policy (policy.xml):
<policy domain="path" rights="none" pattern="/etc/*"/>
With above policy, you get:
$ magick logo: -set profile /etc/passwd logo.png
magick: attempt to perform an operation not allowed by the security policy `/etc/passwd' @ error/blob.c/FileToBlob/1433.
This can be as draconian as needed. Use /* as the path to prevent reading any file with an absolute path. You can also protect against relative paths:
<policy domain="path" rights="none" pattern="../*"/>
(For more information, refer to the complete issue discussion in external references)