ImageMagick once again broke the high-risk 0Day command execution vulnerability

Oriental Alliance Guo Shenghua/Vulnerability description:
ImageMagick recently broke out a remote command execution vulnerability again. Attackers can use the vulnerability to remotely implement command execution, and then may control the server.
Insert picture description here
Affected version:
<=7.0.1-6

Vulnerability level:
high risk

Repair suggestions:
1. In the case that the official has not provided a repair plan, it is recommended to use Baidu Cloud Acceleration. Currently, Baidu Cloud Acceleration WAF firewall can successfully defend against this vulnerability.
2. Add a website to the cloud observation, and learn about sudden/0day vulnerabilities in website components in time.

Guess you like

Origin blog.csdn.net/weixin_45715145/article/details/102547048