ABSTRACT
As an increasing number of businesses and organizations transition their operations online, the significance of software security vulnerabilities becomes ever more critical. This paper explores the phenomenon of arbitrary code execution in PHP through the exploitation of the Imagick extension, a commonly scenario in the field of web development security. It begins with a comprehensive overview of PHP and Imagick, highlighting their integral roles in contemporary web development. The focus then shifts to the mechanics of exploiting Imagick, detailing potential methods of attack and the accompanying risks. Additionally, the paper provides a thorough analysis of strategies and practices essential for safeguarding PHP applications against such vulnerabilities. Targeted primarily at PHP developers, security analysts, and IT professionals, this study serves as a pivotal resource in understanding and mitigating security risks in web development and cybersecurity.
- United states department of commerce. 2018, June 26. NVD - CVE-2018-12712. National Institute of Standards and Technology. https://nvd.nist.gov/vuln/detail/CVE-2018-12712.Google Scholar
- United states department of commerce. 2023, September 13. NVD - CVE-2023-41892. National Institute of Standards and Technology. https://nvd.nist.gov/vuln/detail/CVE-2023-41892.Google Scholar
- United states department of commerce. 2023, September 13. NVD - CVE-2023-41892. National Institute of Standards and Technology. https://nvd.nist.gov/vuln/detail/CVE-2023-41892.Google Scholar
- Paul Krill. 2013, November 18. Believe the Hype: PHP Founder Backs Facebook's HipHop Technology. Infoworld. https://www.infoworld.com/article/2609877/believe-the-hype–php-founder-backs-facebook-s-hiphop-technology.html.Google Scholar
- Imagemagick studio llc. 1999. ImageMagick – Convert, Edit, or Compose Digital Images. ImageMagick. https://imagemagick.org.Google Scholar
- Imagemagick studio llc. 1999. ImageMagick – Command-Line Tools: Conjure. ImageMagick. https://imagemagick.org/script/conjure.php.Google Scholar
- Securityscorecard. 2023. Imagemagick: Products and Vulnerabilities. https://www.cvedetails.com/vendor/1749/Imagemagick.html.Google Scholar
- Stephan Venter. 2023, March 14. Remote Code Execution Attack: What It Is. TuxCare. https://tuxcare.com/blog/remote-code-execution-attack-what-it-is-how-to-protect-your-systems.Google Scholar
- Eamonn Neylon, Tony Hammond, Herbert Van de Sompel, Dr. Stuart Weibel. 2006, April. RFC 4452 - The “Info” URI Scheme for Information Assets with Identifiers in Public Namespaces. IETF Datatracker. https://datatracker.ietf.org/doc/html/rfc4452.Google Scholar
- Cristy. 1993, January. ImageMagick/MagickCore/Utility.c at Main · ImageMagick/ImageMagick. Github. https://github.com/ImageMagick/ImageMagick/blob/main/MagickCore/utility.c#L709.Google Scholar
- Brad bell. 2023, September 13. Remote Code Execution · Advisory · Craftcms/Cms. Github. https://github.com/craftcms/cms/security/advisories/GHSA-4w8r-3xrw-v25g.Google Scholar
Index Terms
- Exploring Dynamic Class Instantiation and Imagick Extension Vulnerabilities in PHP: Insights and Techniques in Securing PHP Applications - A Comprehensive Guide to Dynamic Class Instantiation and Imagick Extension Vulnerabilities
Comments