{"id":167,"date":"2016-05-11T11:50:24","date_gmt":"2016-05-11T11:50:24","guid":{"rendered":"http:\/\/www.urolime.com\/blogs\/in\/?p=167"},"modified":"2016-05-11T11:58:10","modified_gmt":"2016-05-11T11:58:10","slug":"imagetragick-imagemagick-filtering-vulnerability-fix-cve-2016-3714","status":"publish","type":"post","link":"https:\/\/www.urolime.com\/blogs\/in\/imagetragick-imagemagick-filtering-vulnerability-fix-cve-2016-3714\/","title":{"rendered":"ImageTragick &#8211; ImageMagick Filtering Vulnerability Fix"},"content":{"rendered":"<h2><span style=\"font-family: verdana, geneva, sans-serif;\">ImageTragick &#8211; ImageMagick Filtering Vulnerability Fix<\/span><\/h2>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">A vulnerability was found in Imagemagick where insufficient filtering for filenames passed to a delegate&#8217;s command allows remote code execution during the conversion of several file formats.<\/span><\/p>\n<h3><span style=\"font-family: verdana, geneva, sans-serif;\">How to Test<\/span><\/h3>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">There are two ways we can check if the server is vulnerable:<\/span><\/p>\n<ol>\n<li><span style=\"font-family: verdana, geneva, sans-serif;\">Create a test file, imagick_exploit.mvg with following content:<\/span><\/li>\n<\/ol>\n<blockquote>\n<p class=\"p1\"><span class=\"s1\" style=\"font-family: verdana, geneva, sans-serif;\">push graphic-context<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\" style=\"font-family: verdana, geneva, sans-serif;\">viewbox 0 0 640 480<\/span><\/p>\n<p class=\"p1\"><span style=\"font-family: verdana, geneva, sans-serif;\">fill &#8216;url(https:\/\/example.com\/image.jpg&#8221;|ls &#8220;-la)&#8217;<\/span><\/p>\n<p class=\"p2\"><span class=\"s2\" style=\"font-family: verdana, geneva, sans-serif;\">pop graphic-context<\/span><\/p>\n<\/blockquote>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">and execute the following command and see if it display the contents in your folder as an output of the command &#8220;ls&#8221;, if it does, then your server is vulnerable.<\/span><\/p>\n<blockquote><p><span style=\"font-family: verdana, geneva, sans-serif;\">#\u00a0<span class=\"s1\">convert example_exploit.mvg out.png<\/span><\/span><\/p><\/blockquote>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">\u00a0 \u00a0 \u00a0 2. \u00a0If we run the below command before applying the patch, you will get an output as shown below:<\/span><\/p>\n<blockquote><p><span style=\"font-family: verdana, geneva, sans-serif;\"># convert -list policy<\/span><\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Path: [built-in]<\/span><br \/>\n<span style=\"font-family: verdana, geneva, sans-serif;\"> Policy: Undefined<\/span><br \/>\n<span style=\"font-family: verdana, geneva, sans-serif;\"> rights: None<\/span><\/p><\/blockquote>\n<h3><span style=\"font-family: verdana, geneva, sans-serif;\">General fix for all ImageMagick installations<\/span><\/h3>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">ImageMagick has not released a patch yet, but as a workaround, the\u00a0\/etc\/ImageMagick\/policy.xml file can be edited to disable processing of MVG, HTTPS, HTTP, URL, FTP, EPHEMERAL, MSL, LABEL and TEXT commands within image files. In the &lt;policymap&gt; section, add the following lines:<\/span><\/p>\n<blockquote><p><span style=\"font-family: verdana, geneva, sans-serif;\">&lt;policymap&gt;<\/span><br \/>\n<span style=\"font-family: verdana, geneva, sans-serif;\">&#8230;<\/span><br \/>\n<span style=\"font-family: verdana, geneva, sans-serif;\">&lt;policy domain=&#8221;coder&#8221; rights=&#8221;none&#8221; pattern=&#8221;EPHEMERAL&#8221; \/&gt;<\/span><br \/>\n<span style=\"font-family: verdana, geneva, sans-serif;\">&lt;policy domain=&#8221;coder&#8221; rights=&#8221;none&#8221; pattern=&#8221;HTTPS&#8221; \/&gt;<\/span><br \/>\n<span style=\"font-family: verdana, geneva, sans-serif;\">&lt;policy domain=&#8221;coder&#8221; rights=&#8221;none&#8221; pattern=&#8221;HTTP&#8221; \/&gt;<\/span><br \/>\n<span style=\"font-family: verdana, geneva, sans-serif;\">&lt;policy domain=&#8221;coder&#8221; rights=&#8221;none&#8221; pattern=&#8221;URL&#8221; \/&gt;<\/span><br \/>\n<span style=\"font-family: verdana, geneva, sans-serif;\">&lt;policy domain=&#8221;coder&#8221; rights=&#8221;none&#8221; pattern=&#8221;FTP&#8221; \/&gt;<\/span><br \/>\n<span style=\"font-family: verdana, geneva, sans-serif;\">&lt;policy domain=&#8221;coder&#8221; rights=&#8221;none&#8221; pattern=&#8221;MVG&#8221; \/&gt;<\/span><br \/>\n<span style=\"font-family: verdana, geneva, sans-serif;\">&lt;policy domain=&#8221;coder&#8221; rights=&#8221;none&#8221; pattern=&#8221;MSL&#8221; \/&gt;<\/span><br \/>\n<span style=\"font-family: verdana, geneva, sans-serif;\">&lt;policy domain=&#8221;coder&#8221; rights=&#8221;none&#8221; pattern=&#8221;TEXT&#8221; \/&gt;<\/span><br \/>\n<span style=\"font-family: verdana, geneva, sans-serif;\">&lt;policy domain=&#8221;coder&#8221; rights=&#8221;none&#8221; pattern=&#8221;LABEL&#8221; \/&gt;<\/span><br \/>\n<span style=\"font-family: verdana, geneva, sans-serif;\">&lt;\/policymap&gt;<\/span><\/p><\/blockquote>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Restart web services to apply the changes.<\/span><\/p>\n<h3><span style=\"font-family: verdana, geneva, sans-serif;\">cPanel\/WHM<\/span><\/h3>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">cPanel has already released patches for this vulnerability. To apply the patch, run the autorepair script in the terminal:<\/span><\/p>\n<blockquote><p><span style=\"font-family: verdana, geneva, sans-serif;\"># \/scripts\/autorepair mitigate_imagemagick_cve<\/span><\/p><\/blockquote>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">You can also do that using WHM by adding \u201c\/scripts2\/autofixer\u201d to your WHM URL:<\/span><\/p>\n<blockquote><p><span style=\"font-family: verdana, geneva, sans-serif;\">https:\/\/xxx.xxx.xxx.xxx:2087\/cpsess&lt;xxxxxx&gt;\/scripts2\/autofixer<\/span><\/p><\/blockquote>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Then enter \u201cmitigate_imagemagick_cve\u201d under \u201cEnter Script Name\u201d.<\/span><\/p>\n<blockquote><p><span style=\"font-family: verdana, geneva, sans-serif;\">If you have an older version of cPanel, you may want to manually fix this. You can do so by editing the file \u201c\/usr\/local\/cpanel\/3rdparty\/etc\/ImageMagick-6\/policy.xml\u201d, and making the following changes in the \u201c&lt;policymap&gt;\u201d section:<\/span><br \/>\n<span style=\"font-family: verdana, geneva, sans-serif;\">&lt;policymap&gt;<\/span><br \/>\n<span style=\"font-family: verdana, geneva, sans-serif;\">&#8230;<\/span><br \/>\n<span style=\"font-family: verdana, geneva, sans-serif;\">&lt;policy domain=&#8221;coder&#8221; rights=&#8221;none&#8221; pattern=&#8221;EPHEMERAL&#8221; \/&gt;<\/span><br \/>\n<span style=\"font-family: verdana, geneva, sans-serif;\">&lt;policy domain=&#8221;coder&#8221; rights=&#8221;none&#8221; pattern=&#8221;HTTPS&#8221; \/&gt;<\/span><br \/>\n<span style=\"font-family: verdana, geneva, sans-serif;\">&lt;policy domain=&#8221;coder&#8221; rights=&#8221;none&#8221; pattern=&#8221;HTTP&#8221; \/&gt;<\/span><br \/>\n<span style=\"font-family: verdana, geneva, sans-serif;\">&lt;policy domain=&#8221;coder&#8221; rights=&#8221;none&#8221; pattern=&#8221;URL&#8221; \/&gt;<\/span><br \/>\n<span style=\"font-family: verdana, geneva, sans-serif;\">&lt;policy domain=&#8221;coder&#8221; rights=&#8221;none&#8221; pattern=&#8221;FTP&#8221; \/&gt;<\/span><br \/>\n<span style=\"font-family: verdana, geneva, sans-serif;\">&lt;policy domain=&#8221;coder&#8221; rights=&#8221;none&#8221; pattern=&#8221;MVG&#8221; \/&gt;<\/span><br \/>\n<span style=\"font-family: verdana, geneva, sans-serif;\">&lt;policy domain=&#8221;coder&#8221; rights=&#8221;none&#8221; pattern=&#8221;MSL&#8221; \/&gt;<\/span><br \/>\n<span style=\"font-family: verdana, geneva, sans-serif;\">&lt;policy domain=&#8221;coder&#8221; rights=&#8221;none&#8221; pattern=&#8221;TEXT&#8221; \/&gt;<\/span><br \/>\n<span style=\"font-family: verdana, geneva, sans-serif;\">&lt;policy domain=&#8221;coder&#8221; rights=&#8221;none&#8221; pattern=&#8221;LABEL&#8221; \/&gt;<\/span><br \/>\n<span style=\"font-family: verdana, geneva, sans-serif;\">&lt;\/policymap&gt;<\/span><\/p><\/blockquote>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">If you\u2019ve custom installed ImageMagick, the policy file would be in some other location such as \u201c\/etc\/ImageMagick\/policy.xml\u201d (in RedHat systems).<\/span><br \/>\n<pre>Other control panels like &lt;strong&gt;Plesk and DirectAdmin&lt;\/strong&gt; has not yet released a patch. You can follow the custom OS fix on this.<\/pre><\/p>\n<h2><span style=\"font-family: verdana, geneva, sans-serif;\">CentOS\/RedHat\/AWS Linux<\/span><\/h2>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">In AWS Linux\/RHEL\/CentOS 6 and 7, the file\u00a0\/etc\/ImageMagick\/policy.xml should be edited, and the following changes need to be made to the \u201c&lt;policymap&gt;\u201d section:<\/span><\/p>\n<blockquote><p><span style=\"font-family: verdana, geneva, sans-serif;\">&lt;policymap&gt;<\/span><br \/>\n<span style=\"font-family: verdana, geneva, sans-serif;\">&#8230;<\/span><br \/>\n<span style=\"font-family: verdana, geneva, sans-serif;\">&lt;policy domain=&#8221;coder&#8221; rights=&#8221;none&#8221; pattern=&#8221;EPHEMERAL&#8221; \/&gt;<\/span><br \/>\n<span style=\"font-family: verdana, geneva, sans-serif;\">&lt;policy domain=&#8221;coder&#8221; rights=&#8221;none&#8221; pattern=&#8221;HTTPS&#8221; \/&gt;<\/span><br \/>\n<span style=\"font-family: verdana, geneva, sans-serif;\">&lt;policy domain=&#8221;coder&#8221; rights=&#8221;none&#8221; pattern=&#8221;HTTP&#8221; \/&gt;<\/span><br \/>\n<span style=\"font-family: verdana, geneva, sans-serif;\">&lt;policy domain=&#8221;coder&#8221; rights=&#8221;none&#8221; pattern=&#8221;URL&#8221; \/&gt;<\/span><br \/>\n<span style=\"font-family: verdana, geneva, sans-serif;\">&lt;policy domain=&#8221;coder&#8221; rights=&#8221;none&#8221; pattern=&#8221;FTP&#8221; \/&gt;<\/span><br \/>\n<span style=\"font-family: verdana, geneva, sans-serif;\">&lt;policy domain=&#8221;coder&#8221; rights=&#8221;none&#8221; pattern=&#8221;MVG&#8221; \/&gt;<\/span><br \/>\n<span style=\"font-family: verdana, geneva, sans-serif;\">&lt;policy domain=&#8221;coder&#8221; rights=&#8221;none&#8221; pattern=&#8221;MSL&#8221; \/&gt;<\/span><br \/>\n<span style=\"font-family: verdana, geneva, sans-serif;\">&lt;policy domain=&#8221;coder&#8221; rights=&#8221;none&#8221; pattern=&#8221;TEXT&#8221; \/&gt;<\/span><br \/>\n<span style=\"font-family: verdana, geneva, sans-serif;\">&lt;policy domain=&#8221;coder&#8221; rights=&#8221;none&#8221; pattern=&#8221;LABEL&#8221; \/&gt;<\/span><br \/>\n<span style=\"font-family: verdana, geneva, sans-serif;\">&lt;\/policymap&gt;<\/span><\/p><\/blockquote>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">In RHEL\/CentOS 5, the files \u201cmvg.so\u201d, \u201cmsl.so\u201d, and \u201clabel.so\u201d need to be made inaccessible. It\u2019s found under:<\/span><\/p>\n<blockquote><p><span style=\"font-family: verdana, geneva, sans-serif;\">\/usr\/lib64\/ImageMagick-6.2.8\/modules-Q16\/coders\/ \u00a0in 64 bit servers<\/span><br \/>\n<span style=\"font-family: verdana, geneva, sans-serif;\">or<\/span><br \/>\n<span style=\"font-family: verdana, geneva, sans-serif;\">\/usr\/lib\/ImageMagick-6.2.8\/modules-Q16\/coders\/ \u00a0in 32 bit servers<\/span><\/p><\/blockquote>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Rename the files by:<\/span><\/p>\n<blockquote><p><span style=\"font-family: verdana, geneva, sans-serif;\"> # mv\u00a0mvg.so\u00a0mvg.so_bak <\/span><\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\"> # mv msl.so msl.so_bak <\/span><\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\"> # mv label.so label.so_bak<\/span><\/p><\/blockquote>\n<h3><span style=\"font-family: verdana, geneva, sans-serif;\">Ubuntu\/Debian<\/span><\/h3>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">In Ubuntu and Debian systems, the file\u00a0\/etc\/ImageMagick\/policy.xml need to be edited, and the following changes need to be made to the \u201c&lt;policymap&gt;\u201d section:<\/span><\/p>\n<blockquote><p><span style=\"font-family: verdana, geneva, sans-serif;\">&lt;policymap&gt;<\/span><br \/>\n<span style=\"font-family: verdana, geneva, sans-serif;\">&#8230;<\/span><br \/>\n<span style=\"font-family: verdana, geneva, sans-serif;\">&lt;policy domain=&#8221;coder&#8221; rights=&#8221;none&#8221; pattern=&#8221;EPHEMERAL&#8221; \/&gt;<\/span><br \/>\n<span style=\"font-family: verdana, geneva, sans-serif;\">&lt;policy domain=&#8221;coder&#8221; rights=&#8221;none&#8221; pattern=&#8221;HTTPS&#8221; \/&gt;<\/span><br \/>\n<span style=\"font-family: verdana, geneva, sans-serif;\">&lt;policy domain=&#8221;coder&#8221; rights=&#8221;none&#8221; pattern=&#8221;HTTP&#8221; \/&gt;<\/span><br \/>\n<span style=\"font-family: verdana, geneva, sans-serif;\">&lt;policy domain=&#8221;coder&#8221; rights=&#8221;none&#8221; pattern=&#8221;URL&#8221; \/&gt;<\/span><br \/>\n<span style=\"font-family: verdana, geneva, sans-serif;\">&lt;policy domain=&#8221;coder&#8221; rights=&#8221;none&#8221; pattern=&#8221;FTP&#8221; \/&gt;<\/span><br \/>\n<span style=\"font-family: verdana, geneva, sans-serif;\">&lt;policy domain=&#8221;coder&#8221; rights=&#8221;none&#8221; pattern=&#8221;MVG&#8221; \/&gt;<\/span><br \/>\n<span style=\"font-family: verdana, geneva, sans-serif;\">&lt;policy domain=&#8221;coder&#8221; rights=&#8221;none&#8221; pattern=&#8221;MSL&#8221; \/&gt;<\/span><br \/>\n<span style=\"font-family: verdana, geneva, sans-serif;\">&lt;policy domain=&#8221;coder&#8221; rights=&#8221;none&#8221; pattern=&#8221;TEXT&#8221; \/&gt;<\/span><br \/>\n<span style=\"font-family: verdana, geneva, sans-serif;\">&lt;policy domain=&#8221;coder&#8221; rights=&#8221;none&#8221; pattern=&#8221;LABEL&#8221; \/&gt;<\/span><br \/>\n<span style=\"font-family: verdana, geneva, sans-serif;\">&lt;\/policymap&gt;<\/span><\/p><\/blockquote>\n<h3><span style=\"font-family: verdana, geneva, sans-serif;\">CloudLinux<\/span><\/h3>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">In CloudLinux servers that has CageFS enabled, a copy of the policy file may be present in each individual\u2019s environment. So, follow the below steps to force all accounts to reload the new ImageMagick policy file:<\/span><\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Edit the files:<\/span><\/p>\n<blockquote><p><span style=\"font-family: verdana, geneva, sans-serif;\">\/opt\/alt\/alt-ImageMagick\/etc\/ImageMagick-6\/policy.xml<\/span><br \/>\n<span style=\"font-family: verdana, geneva, sans-serif;\">\/opt\/cloudlinux\/lib\/ImageMagick-6.5.4\/config\/policy.xml<\/span><br \/>\n<span style=\"font-family: verdana, geneva, sans-serif;\">\/etc\/ImageMagick\/policy.xml<\/span><\/p><\/blockquote>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Make the following changes in &lt;policymap&gt; section.<\/span><\/p>\n<blockquote><p><span style=\"font-family: verdana, geneva, sans-serif;\">&lt;policymap&gt;<\/span><br \/>\n<span style=\"font-family: verdana, geneva, sans-serif;\">&#8230;<\/span><br \/>\n<span style=\"font-family: verdana, geneva, sans-serif;\">&lt;policy domain=&#8221;coder&#8221; rights=&#8221;none&#8221; pattern=&#8221;EPHEMERAL&#8221; \/&gt;<\/span><br \/>\n<span style=\"font-family: verdana, geneva, sans-serif;\">&lt;policy domain=&#8221;coder&#8221; rights=&#8221;none&#8221; pattern=&#8221;HTTPS&#8221; \/&gt;<\/span><br \/>\n<span style=\"font-family: verdana, geneva, sans-serif;\">&lt;policy domain=&#8221;coder&#8221; rights=&#8221;none&#8221; pattern=&#8221;HTTP&#8221; \/&gt;<\/span><br \/>\n<span style=\"font-family: verdana, geneva, sans-serif;\">&lt;policy domain=&#8221;coder&#8221; rights=&#8221;none&#8221; pattern=&#8221;URL&#8221; \/&gt;<\/span><br \/>\n<span style=\"font-family: verdana, geneva, sans-serif;\">&lt;policy domain=&#8221;coder&#8221; rights=&#8221;none&#8221; pattern=&#8221;FTP&#8221; \/&gt;<\/span><br \/>\n<span style=\"font-family: verdana, geneva, sans-serif;\">&lt;policy domain=&#8221;coder&#8221; rights=&#8221;none&#8221; pattern=&#8221;MVG&#8221; \/&gt;<\/span><br \/>\n<span style=\"font-family: verdana, geneva, sans-serif;\">&lt;policy domain=&#8221;coder&#8221; rights=&#8221;none&#8221; pattern=&#8221;MSL&#8221; \/&gt;<\/span><br \/>\n<span style=\"font-family: verdana, geneva, sans-serif;\">&lt;policy domain=&#8221;coder&#8221; rights=&#8221;none&#8221; pattern=&#8221;TEXT&#8221; \/&gt;<\/span><br \/>\n<span style=\"font-family: verdana, geneva, sans-serif;\">&lt;policy domain=&#8221;coder&#8221; rights=&#8221;none&#8221; pattern=&#8221;LABEL&#8221; \/&gt;<\/span><br \/>\n<span style=\"font-family: verdana, geneva, sans-serif;\">&lt;\/policymap&gt;<\/span><\/p><\/blockquote>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Then reload CageFS using:<\/span><\/p>\n<blockquote><p><span style=\"font-family: verdana, geneva, sans-serif;\">cagefsctl &#8211;force-update<\/span><\/p><\/blockquote>\n<h3><span style=\"font-family: verdana, geneva, sans-serif;\">How do I verify<\/span><\/h3>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">To Make sure the patching is applied you can run the below command and the result will looks like:<\/span><\/p>\n<blockquote><p><span style=\"font-family: verdana, geneva, sans-serif;\"># convert -list policy<\/span><\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Path: [built-in]<\/span><br \/>\n<span style=\"font-family: verdana, geneva, sans-serif;\"> Policy: Undefined<\/span><br \/>\n<span style=\"font-family: verdana, geneva, sans-serif;\"> rights: None<\/span><\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Path: \/etc\/ImageMagick\/policy.xml<\/span><br \/>\n<span style=\"font-family: verdana, geneva, sans-serif;\"> Policy: Coder<\/span><br \/>\n<span style=\"font-family: verdana, geneva, sans-serif;\"> rights: None<\/span><br \/>\n<span style=\"font-family: verdana, geneva, sans-serif;\"> pattern: EPHEMERAL<\/span><br \/>\n<span style=\"font-family: verdana, geneva, sans-serif;\"> Policy: Coder<\/span><br \/>\n<span style=\"font-family: verdana, geneva, sans-serif;\"> rights: None<\/span><br \/>\n<span style=\"font-family: verdana, geneva, sans-serif;\"> pattern: HTTPS<\/span><br \/>\n<span style=\"font-family: verdana, geneva, sans-serif;\"> Policy: Coder<\/span><br \/>\n<span style=\"font-family: verdana, geneva, sans-serif;\"> rights: None<\/span><br \/>\n<span style=\"font-family: verdana, geneva, sans-serif;\"> pattern: HTTP<\/span><br \/>\n<span style=\"font-family: verdana, geneva, sans-serif;\"> Policy: Coder<\/span><br \/>\n<span style=\"font-family: verdana, geneva, sans-serif;\"> rights: None<\/span><br \/>\n<span style=\"font-family: verdana, geneva, sans-serif;\"> pattern: URL<\/span><br \/>\n<span style=\"font-family: verdana, geneva, sans-serif;\"> Policy: Coder<\/span><br \/>\n<span style=\"font-family: verdana, geneva, sans-serif;\"> rights: None<\/span><br \/>\n<span style=\"font-family: verdana, geneva, sans-serif;\"> pattern: FTP<\/span><br \/>\n<span style=\"font-family: verdana, geneva, sans-serif;\"> Policy: Coder<\/span><br \/>\n<span style=\"font-family: verdana, geneva, sans-serif;\"> rights: None<\/span><br \/>\n<span style=\"font-family: verdana, geneva, sans-serif;\"> pattern: MVG<\/span><br \/>\n<span style=\"font-family: verdana, geneva, sans-serif;\"> Policy: Coder<\/span><br \/>\n<span style=\"font-family: verdana, geneva, sans-serif;\"> rights: None<\/span><br \/>\n<span style=\"font-family: verdana, geneva, sans-serif;\"> pattern: MSL<\/span><br \/>\n<span style=\"font-family: verdana, geneva, sans-serif;\"> Policy: Coder<\/span><br \/>\n<span style=\"font-family: verdana, geneva, sans-serif;\"> rights: None<\/span><br \/>\n<span style=\"font-family: verdana, geneva, sans-serif;\"> pattern: TEXT<\/span><br \/>\n<span style=\"font-family: verdana, geneva, sans-serif;\"> Policy: Coder<\/span><br \/>\n<span style=\"font-family: verdana, geneva, sans-serif;\"> rights: None<\/span><br \/>\n<span style=\"font-family: verdana, geneva, sans-serif;\"> pattern: LABEL<\/span><br \/>\n<span style=\"font-family: verdana, geneva, sans-serif;\"> Policy: Path<\/span><br \/>\n<span style=\"font-family: verdana, geneva, sans-serif;\"> rights: None<\/span><br \/>\n<span style=\"font-family: verdana, geneva, sans-serif;\"> pattern: @*<\/span><\/p><\/blockquote>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">If you need any support to patch your servers, please don&#8217;t hesitate to contact our support.<\/span><\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">References:<\/span><\/p>\n<p><a href=\"https:\/\/access.redhat.com\/security\/vulnerabilities\/2296071\"><span style=\"font-family: verdana, geneva, sans-serif;\">https:\/\/access.redhat.com\/security\/vulnerabilities\/2296071<\/span><\/a><\/p>\n<div class=\"pvc_clear\"><\/div>\n<p id=\"pvc_stats_167\" class=\"pvc_stats all  \" data-element-id=\"167\" style=\"\"><i class=\"pvc-stats-icon medium\" aria-hidden=\"true\"><svg aria-hidden=\"true\" focusable=\"false\" data-prefix=\"far\" data-icon=\"chart-bar\" role=\"img\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\" class=\"svg-inline--fa fa-chart-bar fa-w-16 fa-2x\"><path fill=\"currentColor\" d=\"M396.8 352h22.4c6.4 0 12.8-6.4 12.8-12.8V108.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v230.4c0 6.4 6.4 12.8 12.8 12.8zm-192 0h22.4c6.4 0 12.8-6.4 12.8-12.8V140.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v198.4c0 6.4 6.4 12.8 12.8 12.8zm96 0h22.4c6.4 0 12.8-6.4 12.8-12.8V204.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v134.4c0 6.4 6.4 12.8 12.8 12.8zM496 400H48V80c0-8.84-7.16-16-16-16H16C7.16 64 0 71.16 0 80v336c0 17.67 14.33 32 32 32h464c8.84 0 16-7.16 16-16v-16c0-8.84-7.16-16-16-16zm-387.2-48h22.4c6.4 0 12.8-6.4 12.8-12.8v-70.4c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v70.4c0 6.4 6.4 12.8 12.8 12.8z\" class=\"\"><\/path><\/svg><\/i> <img loading=\"lazy\" decoding=\"async\" width=\"16\" height=\"16\" alt=\"Loading\" src=\"https:\/\/www.urolime.com\/blogs\/in\/wp-content\/plugins\/page-views-count\/ajax-loader-2x.gif\" border=0 \/><\/p>\n<div class=\"pvc_clear\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>ImageTragick &#8211; ImageMagick Filtering Vulnerability Fix A vulnerability was found in Imagemagick where insufficient filtering for filenames passed to a delegate&#8217;s command allows remote code execution during the conversion of several file formats. How to Test There are two ways we can check if the server is vulnerable: Create a test file, imagick_exploit.mvg with following [&hellip;]<\/p>\n<div class=\"pvc_clear\"><\/div>\n<p id=\"pvc_stats_167\" class=\"pvc_stats all  \" data-element-id=\"167\" style=\"\"><i class=\"pvc-stats-icon medium\" aria-hidden=\"true\"><svg aria-hidden=\"true\" focusable=\"false\" data-prefix=\"far\" data-icon=\"chart-bar\" role=\"img\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\" class=\"svg-inline--fa fa-chart-bar fa-w-16 fa-2x\"><path fill=\"currentColor\" d=\"M396.8 352h22.4c6.4 0 12.8-6.4 12.8-12.8V108.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v230.4c0 6.4 6.4 12.8 12.8 12.8zm-192 0h22.4c6.4 0 12.8-6.4 12.8-12.8V140.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v198.4c0 6.4 6.4 12.8 12.8 12.8zm96 0h22.4c6.4 0 12.8-6.4 12.8-12.8V204.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v134.4c0 6.4 6.4 12.8 12.8 12.8zM496 400H48V80c0-8.84-7.16-16-16-16H16C7.16 64 0 71.16 0 80v336c0 17.67 14.33 32 32 32h464c8.84 0 16-7.16 16-16v-16c0-8.84-7.16-16-16-16zm-387.2-48h22.4c6.4 0 12.8-6.4 12.8-12.8v-70.4c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v70.4c0 6.4 6.4 12.8 12.8 12.8z\" class=\"\"><\/path><\/svg><\/i> <img loading=\"lazy\" decoding=\"async\" width=\"16\" height=\"16\" alt=\"Loading\" src=\"https:\/\/www.urolime.com\/blogs\/in\/wp-content\/plugins\/page-views-count\/ajax-loader-2x.gif\" border=0 \/><\/p>\n<div class=\"pvc_clear\"><\/div>\n","protected":false},"author":1,"featured_media":178,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","sfsi_plus_gutenberg_text_before_share":"","sfsi_plus_gutenberg_show_text_before_share":"","sfsi_plus_gutenberg_icon_type":"","sfsi_plus_gutenberg_icon_alignemt":"","sfsi_plus_gutenburg_max_per_row":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-167","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.3.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>ImageTragick - ImageMagick Filtering Vulnerability Fix<\/title>\n<meta name=\"description\" content=\"ImageTragick - ImageMagick Filtering Vulnerability Fix - (CVE-2016-3714), Vulnerability Test and Fix for your easy administration\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.urolime.com\/blogs\/in\/imagetragick-imagemagick-filtering-vulnerability-fix-cve-2016-3714\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"ImageTragick - ImageMagick Filtering Vulnerability Fix\" \/>\n<meta property=\"og:description\" content=\"ImageTragick - ImageMagick Filtering Vulnerability Fix - (CVE-2016-3714), Vulnerability Test and Fix for your easy administration\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.urolime.com\/blogs\/in\/imagetragick-imagemagick-filtering-vulnerability-fix-cve-2016-3714\/\" \/>\n<meta property=\"og:site_name\" content=\"Urolime Blogs\" \/>\n<meta property=\"article:published_time\" content=\"2016-05-11T11:50:24+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-05-11T11:58:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.urolime.com\/blogs\/in\/wp-content\/uploads\/sites\/9\/2016\/05\/Imagetragick.png\" \/>\n\t<meta property=\"og:image:width\" content=\"221\" \/>\n\t<meta property=\"og:image:height\" content=\"228\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Urolime Technologies\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Urolime Technologies\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.urolime.com\/blogs\/in\/imagetragick-imagemagick-filtering-vulnerability-fix-cve-2016-3714\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/in\/imagetragick-imagemagick-filtering-vulnerability-fix-cve-2016-3714\/\"},\"author\":{\"name\":\"Urolime Technologies\",\"@id\":\"https:\/\/www.urolime.com\/blogs\/in\/#\/schema\/person\/c231f59d5f2c2516e0efc6067ee0c22c\"},\"headline\":\"ImageTragick &#8211; ImageMagick Filtering Vulnerability Fix\",\"datePublished\":\"2016-05-11T11:50:24+00:00\",\"dateModified\":\"2016-05-11T11:58:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/in\/imagetragick-imagemagick-filtering-vulnerability-fix-cve-2016-3714\/\"},\"wordCount\":1082,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/in\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/in\/imagetragick-imagemagick-filtering-vulnerability-fix-cve-2016-3714\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.urolime.com\/blogs\/in\/wp-content\/uploads\/sites\/9\/2016\/05\/Imagetragick.png\",\"articleSection\":[\"General\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.urolime.com\/blogs\/in\/imagetragick-imagemagick-filtering-vulnerability-fix-cve-2016-3714\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.urolime.com\/blogs\/in\/imagetragick-imagemagick-filtering-vulnerability-fix-cve-2016-3714\/\",\"url\":\"https:\/\/www.urolime.com\/blogs\/in\/imagetragick-imagemagick-filtering-vulnerability-fix-cve-2016-3714\/\",\"name\":\"ImageTragick - ImageMagick Filtering Vulnerability Fix\",\"isPartOf\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/in\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/in\/imagetragick-imagemagick-filtering-vulnerability-fix-cve-2016-3714\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/in\/imagetragick-imagemagick-filtering-vulnerability-fix-cve-2016-3714\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.urolime.com\/blogs\/in\/wp-content\/uploads\/sites\/9\/2016\/05\/Imagetragick.png\",\"datePublished\":\"2016-05-11T11:50:24+00:00\",\"dateModified\":\"2016-05-11T11:58:10+00:00\",\"description\":\"ImageTragick - ImageMagick Filtering Vulnerability Fix - (CVE-2016-3714), Vulnerability Test and Fix for your easy administration\",\"breadcrumb\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/in\/imagetragick-imagemagick-filtering-vulnerability-fix-cve-2016-3714\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.urolime.com\/blogs\/in\/imagetragick-imagemagick-filtering-vulnerability-fix-cve-2016-3714\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.urolime.com\/blogs\/in\/imagetragick-imagemagick-filtering-vulnerability-fix-cve-2016-3714\/#primaryimage\",\"url\":\"https:\/\/www.urolime.com\/blogs\/in\/wp-content\/uploads\/sites\/9\/2016\/05\/Imagetragick.png\",\"contentUrl\":\"https:\/\/www.urolime.com\/blogs\/in\/wp-content\/uploads\/sites\/9\/2016\/05\/Imagetragick.png\",\"width\":221,\"height\":228,\"caption\":\"Imagetragick\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.urolime.com\/blogs\/in\/imagetragick-imagemagick-filtering-vulnerability-fix-cve-2016-3714\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.urolime.com\/blogs\/in\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"ImageTragick &#8211; ImageMagick Filtering Vulnerability Fix\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.urolime.com\/blogs\/in\/#website\",\"url\":\"https:\/\/www.urolime.com\/blogs\/in\/\",\"name\":\"Urolime Blogs\",\"description\":\"The place for DevOps, Cloud, Kubernetes News and Updates\",\"publisher\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/in\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.urolime.com\/blogs\/in\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.urolime.com\/blogs\/in\/#organization\",\"name\":\"Urolime Blogs\",\"url\":\"https:\/\/www.urolime.com\/blogs\/in\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.urolime.com\/blogs\/in\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.urolime.com\/blogs\/in\/wp-content\/uploads\/sites\/9\/2021\/06\/cropped-250-x250.jpg\",\"contentUrl\":\"https:\/\/www.urolime.com\/blogs\/in\/wp-content\/uploads\/sites\/9\/2021\/06\/cropped-250-x250.jpg\",\"width\":250,\"height\":73,\"caption\":\"Urolime Blogs\"},\"image\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/in\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.urolime.com\/blogs\/in\/#\/schema\/person\/c231f59d5f2c2516e0efc6067ee0c22c\",\"name\":\"Urolime Technologies\",\"description\":\"Urolime Technologies has made groundbreaking accomplishments in the field of Google Cloud &amp; Kubernetes Consulting, DevOps Services, 24\/7 Managed Services &amp; Support, Dedicated IT Team, Managed AWS Consulting and Azure Cloud Consulting. We believe our customers are Smart to choose their IT Partner, and we \u201cDo IT Smart\u201d.\",\"sameAs\":[\"https:\/\/www.urolime.com\/\"],\"url\":\"https:\/\/www.urolime.com\/blogs\/in\/author\/blogadmin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"ImageTragick - ImageMagick Filtering Vulnerability Fix","description":"ImageTragick - ImageMagick Filtering Vulnerability Fix - (CVE-2016-3714), Vulnerability Test and Fix for your easy administration","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.urolime.com\/blogs\/in\/imagetragick-imagemagick-filtering-vulnerability-fix-cve-2016-3714\/","og_locale":"en_US","og_type":"article","og_title":"ImageTragick - ImageMagick Filtering Vulnerability Fix","og_description":"ImageTragick - ImageMagick Filtering Vulnerability Fix - (CVE-2016-3714), Vulnerability Test and Fix for your easy administration","og_url":"https:\/\/www.urolime.com\/blogs\/in\/imagetragick-imagemagick-filtering-vulnerability-fix-cve-2016-3714\/","og_site_name":"Urolime Blogs","article_published_time":"2016-05-11T11:50:24+00:00","article_modified_time":"2016-05-11T11:58:10+00:00","og_image":[{"width":221,"height":228,"url":"https:\/\/www.urolime.com\/blogs\/in\/wp-content\/uploads\/sites\/9\/2016\/05\/Imagetragick.png","type":"image\/png"}],"author":"Urolime Technologies","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Urolime Technologies","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.urolime.com\/blogs\/in\/imagetragick-imagemagick-filtering-vulnerability-fix-cve-2016-3714\/#article","isPartOf":{"@id":"https:\/\/www.urolime.com\/blogs\/in\/imagetragick-imagemagick-filtering-vulnerability-fix-cve-2016-3714\/"},"author":{"name":"Urolime Technologies","@id":"https:\/\/www.urolime.com\/blogs\/in\/#\/schema\/person\/c231f59d5f2c2516e0efc6067ee0c22c"},"headline":"ImageTragick &#8211; ImageMagick Filtering Vulnerability Fix","datePublished":"2016-05-11T11:50:24+00:00","dateModified":"2016-05-11T11:58:10+00:00","mainEntityOfPage":{"@id":"https:\/\/www.urolime.com\/blogs\/in\/imagetragick-imagemagick-filtering-vulnerability-fix-cve-2016-3714\/"},"wordCount":1082,"commentCount":0,"publisher":{"@id":"https:\/\/www.urolime.com\/blogs\/in\/#organization"},"image":{"@id":"https:\/\/www.urolime.com\/blogs\/in\/imagetragick-imagemagick-filtering-vulnerability-fix-cve-2016-3714\/#primaryimage"},"thumbnailUrl":"https:\/\/www.urolime.com\/blogs\/in\/wp-content\/uploads\/sites\/9\/2016\/05\/Imagetragick.png","articleSection":["General"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.urolime.com\/blogs\/in\/imagetragick-imagemagick-filtering-vulnerability-fix-cve-2016-3714\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.urolime.com\/blogs\/in\/imagetragick-imagemagick-filtering-vulnerability-fix-cve-2016-3714\/","url":"https:\/\/www.urolime.com\/blogs\/in\/imagetragick-imagemagick-filtering-vulnerability-fix-cve-2016-3714\/","name":"ImageTragick - ImageMagick Filtering Vulnerability Fix","isPartOf":{"@id":"https:\/\/www.urolime.com\/blogs\/in\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.urolime.com\/blogs\/in\/imagetragick-imagemagick-filtering-vulnerability-fix-cve-2016-3714\/#primaryimage"},"image":{"@id":"https:\/\/www.urolime.com\/blogs\/in\/imagetragick-imagemagick-filtering-vulnerability-fix-cve-2016-3714\/#primaryimage"},"thumbnailUrl":"https:\/\/www.urolime.com\/blogs\/in\/wp-content\/uploads\/sites\/9\/2016\/05\/Imagetragick.png","datePublished":"2016-05-11T11:50:24+00:00","dateModified":"2016-05-11T11:58:10+00:00","description":"ImageTragick - ImageMagick Filtering Vulnerability Fix - (CVE-2016-3714), Vulnerability Test and Fix for your easy administration","breadcrumb":{"@id":"https:\/\/www.urolime.com\/blogs\/in\/imagetragick-imagemagick-filtering-vulnerability-fix-cve-2016-3714\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.urolime.com\/blogs\/in\/imagetragick-imagemagick-filtering-vulnerability-fix-cve-2016-3714\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.urolime.com\/blogs\/in\/imagetragick-imagemagick-filtering-vulnerability-fix-cve-2016-3714\/#primaryimage","url":"https:\/\/www.urolime.com\/blogs\/in\/wp-content\/uploads\/sites\/9\/2016\/05\/Imagetragick.png","contentUrl":"https:\/\/www.urolime.com\/blogs\/in\/wp-content\/uploads\/sites\/9\/2016\/05\/Imagetragick.png","width":221,"height":228,"caption":"Imagetragick"},{"@type":"BreadcrumbList","@id":"https:\/\/www.urolime.com\/blogs\/in\/imagetragick-imagemagick-filtering-vulnerability-fix-cve-2016-3714\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.urolime.com\/blogs\/in\/"},{"@type":"ListItem","position":2,"name":"ImageTragick &#8211; ImageMagick Filtering Vulnerability Fix"}]},{"@type":"WebSite","@id":"https:\/\/www.urolime.com\/blogs\/in\/#website","url":"https:\/\/www.urolime.com\/blogs\/in\/","name":"Urolime Blogs","description":"The place for DevOps, Cloud, Kubernetes News and Updates","publisher":{"@id":"https:\/\/www.urolime.com\/blogs\/in\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.urolime.com\/blogs\/in\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.urolime.com\/blogs\/in\/#organization","name":"Urolime Blogs","url":"https:\/\/www.urolime.com\/blogs\/in\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.urolime.com\/blogs\/in\/#\/schema\/logo\/image\/","url":"https:\/\/www.urolime.com\/blogs\/in\/wp-content\/uploads\/sites\/9\/2021\/06\/cropped-250-x250.jpg","contentUrl":"https:\/\/www.urolime.com\/blogs\/in\/wp-content\/uploads\/sites\/9\/2021\/06\/cropped-250-x250.jpg","width":250,"height":73,"caption":"Urolime Blogs"},"image":{"@id":"https:\/\/www.urolime.com\/blogs\/in\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.urolime.com\/blogs\/in\/#\/schema\/person\/c231f59d5f2c2516e0efc6067ee0c22c","name":"Urolime Technologies","description":"Urolime Technologies has made groundbreaking accomplishments in the field of Google Cloud &amp; Kubernetes Consulting, DevOps Services, 24\/7 Managed Services &amp; Support, Dedicated IT Team, Managed AWS Consulting and Azure Cloud Consulting. We believe our customers are Smart to choose their IT Partner, and we \u201cDo IT Smart\u201d.","sameAs":["https:\/\/www.urolime.com\/"],"url":"https:\/\/www.urolime.com\/blogs\/in\/author\/blogadmin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.urolime.com\/blogs\/in\/wp-json\/wp\/v2\/posts\/167","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.urolime.com\/blogs\/in\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.urolime.com\/blogs\/in\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.urolime.com\/blogs\/in\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.urolime.com\/blogs\/in\/wp-json\/wp\/v2\/comments?post=167"}],"version-history":[{"count":12,"href":"https:\/\/www.urolime.com\/blogs\/in\/wp-json\/wp\/v2\/posts\/167\/revisions"}],"predecessor-version":[{"id":180,"href":"https:\/\/www.urolime.com\/blogs\/in\/wp-json\/wp\/v2\/posts\/167\/revisions\/180"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.urolime.com\/blogs\/in\/wp-json\/wp\/v2\/media\/178"}],"wp:attachment":[{"href":"https:\/\/www.urolime.com\/blogs\/in\/wp-json\/wp\/v2\/media?parent=167"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.urolime.com\/blogs\/in\/wp-json\/wp\/v2\/categories?post=167"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.urolime.com\/blogs\/in\/wp-json\/wp\/v2\/tags?post=167"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}