As explained in the article, the position of Imagemagick teams is clear and they are quite reactive on security subject. We warned them about the dangerousness of SVG Parsing, and default allowing of SVG, but their response was what we expected:
*While it's possible to defend against certain vulnerabilities, such as the use of SVG's xlink, through a definition mechanism, it's not a robust security approach. For instance, xlink would remain inactive by default unless a specific definition is specified. Yet, this strategy proves inadequate as it's akin to a temporary solution, and we would be continuously reacting to emerging vulnerabilities until the next one emerges. The security policy was designed specifically to address potentially unknown exploits. If a new exploit is discovered, the user is protected by invoking the appropriate security policy. The result is immediate protection against the exploit without the need to update the binary distribution.
Security is a compromise between security and convenience. The open nature of ImageMagick allows any user to exploit all the features of the package in a secure environment such as Docker, yet the security policy allows an administrator to selectively lock out features per their local context in a more open environment such as a public web site. For any public web site, we recommend these coders: MSL, MSVG, MVG, PS, PDF, RSVG, SVG, XPS, be disabled in the security policy.
To be clear, if you are a WordPress administrator, you must reinforce your default security Imagick policies located in /etc/ImageMagick-X/policy.xml, to disallow MSL, MSVG, MVG, PS, PDF, RSVG, SVG, XPS (especially SVG not disable by default which is for us one of the dangerous one). Even if you think that your WordPress does not use this library.
Regarding the plugin itself, special thanks to David Lingren which has been quite reactive for the fix (3.10 version).
Finally, all Patrowl customers using this plugin were warned. The plugins have been disabled during the time of patching, and then re-enabled the plugin when 3.10 has been released with the correction. Some of them even restrict Imagick libraries to be sure.
Timeline:
- Vulnerability discovered: 07/26/2023
- Working POC: 07/29/2023
- Patrowl report to Wordpress Plugins Security teams: 08/08/2023
- Patrowl Direct report to plugins creator: 08/16/2023
- Wordpress security team report to Plugin creator: 08/17/2023
- Acknowledgement and patching from Plugin creator: 08/18/2023
- Official Patch released: 08/21/2023 (3.10)
- Vulnerability sent for CVE to WordFense: 08/29/2023
- CVE-2023-4634 reserved 08/30/2023
- Publication 09/06/2023
References: