convert:not authorized `aaaa` @ error/constitute.c/ReadImage/453

后端 未结 11 2247
无人及你
无人及你 2020-11-27 08:50

I want to create a captcha pic by use convert from ImageMagick.

And I follow this, but there are some problem .

Input In my linux shell:

相关标签:
11条回答
  • 2020-11-27 09:27

    After reading several suggestions here and combining the ideas, for me following changes in /etc/ImageMagick-6/policy.xml were necessary:

    <policy domain="coder" rights="read|write" pattern="PDF" />
    

    ... rights="none" did not help. ...pattern="LABEL" was not neccessary. Although I do not work with big png files (only ~1 Mb) some changes in memory limits were also necessary:

    <policy domain="resource" name="memory" value="2GiB"/>
    

    (instead of 256Mib), and

    <policy domain="resource" name="area" value="2GB"/>
    

    (instead of 128 MB)

    0 讨论(0)
  • 2020-11-27 09:29

    If someone need to do it with one command after install, run this !

    sed -i 's/<policy domain="coder" rights="none" pattern="PDF" \/>/<policy domain="coder" rights="read|write" pattern="PDF" \/>/g' /etc/ImageMagick-6/policy.xml
    
    0 讨论(0)
  • 2020-11-27 09:32

    If you don't need to handle raster files and PDF/PS/EPS through the same tool, don't loosen ImageMagick's security.

    Instead, keep your defense in depth for your web applications intact, check that your Ghostscript has been patched for all known -dSAFER vulnerabilities and then invoke it directly.

    gs -dSAFER -r300 -sDEVICE=png16m -o document-%03d.png document.pdf
    
    • -dSAFER opts you out of the legacy-compatibility "run Postscript will full permission to interact with the outside world as a turing-complete programming language" mode.
    • -r300 sets the desired DPI to 300 (the default is 72)
    • -sDEVICE specifies the output format (See the Devices section of the manual for other choices.)
    • -o is a shorthand for -dBATCH -dNOPAUSE -sOutputFile=
    • This section of the Ghostscript manual gives some example formats for for multi-file filename output but, for the actual syntax definition, it points you at the documentation for the C printf(3) function.

    If you're rendering EPS files, add -dEPSCrop so it won't pad your output to page size and use -sDEVICE=pngalpha to get transparent backgrounds.

    0 讨论(0)
  • 2020-11-27 09:35

    The answer with highest votes (I have not enough reputation to add comment there) suggests to comment out the MVG line, but have in mind this:

    CVE-2016-3714

    ImageMagick supports ".svg/.mvg" files which means that attackers can craft code in a scripting language, e.g. MSL (Magick Scripting Language) and MVG (Magick Vector Graphics), upload it to a server disguised as an image file and force the software to run malicious commands on the server side as described above. For example adding the following commands in a file and uploading it to a webserver that uses a vulnerable ImageMagick version will result in running the command "ls -la" on the server.

    exploit.jpg:

    push graphic-context viewbox 0 0 640 480 fill 'url(https://website.com/image.png"|ls "-la)' pop graphic-context

    And

    Any version below 7.0.1-2 or 6.9.4-0 is potentially vulnerable and affected parties should as soon as possible upgrade to the latest ImageMagick version.

    Source

    0 讨论(0)
  • 2020-11-27 09:36

    I use many times the ImageMagic convert command to convert *.tif files to *.pdf files.

    I don't know why but today I began to receive the following error:

    convert: not authorized `a.pdf' @ error/constitute.c/WriteImage/1028.
    

    After issuing the command:

    convert a.tif a.pdf
    

    After reading the above answers I edited the file /etc/ImageMagick-6/policy.xml

    and changed the line:

    policy domain="coder" rights="none" pattern="PDF" 
    

    to

    policy domain="coder" rights="read|write" pattern="PDF"
    

    and now everything works fine.

    I have "ImageMagick 6.8.9-9 Q16 x86_64 2018-09-28" on "Ubuntu 16.04.5 LTS".

    0 讨论(0)
  • 2020-11-27 09:38

    Note: this solution and any other "edit the policy.xml" solution disables safety measures against arbitrary code execution vulnerabilities in ImageMagick. If you need to process input that you do not control 100%, you should use a different program (not ImageMagick).

    If you're still here, you are trying to edit images that you have complete control over, know are safe, and cannot be edited by users.

    There is an /etc/ImageMagick/policy.xml file that is installed by yum. It disallows almost everything (for security and to protect your system from getting overloaded with ImageMagick calls).

    If you're getting a ReadImage error as above, you can change the line to:

    <policy domain="coder" rights="read" pattern="LABEL" />
    

    which should fix the issue.

    The file has a bunch of documentation in it, so you should read that. For example, if you need more permissions, you can combine them like:

    <policy domain="coder" rights="read|write" pattern="LABEL" />
    

    ...which is preferable to removing all permissions checks (i.e., deleting or commenting out the line).

    0 讨论(0)
提交回复
热议问题