6.8
CVSSv2

CVE-2011-4106

Published: 26/10/2013 Updated: 28/10/2013
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
VMScore: 690
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

TimThumb (timthumb.php) prior to 2.0 does not validate the entire source with the domain white list, which allows remote malicious users to upload and execute arbitrary code via a URL containing a white-listed domain in the src parameter, then accessing it via a direct request to the file in the cache directory, as exploited in the wild in August 2011.

Vulnerable Product Search on Vulmon Subscribe to Product

binarymoon timthumb

Exploits

# Exploit Title: Multiple Wordpress timthumbphp reuse vulnerabilities # Date: 09/19/2011 # Author: Ben Schmidt (supernothing (AT) spareclockcyclesorg @_supernothing) --- Description --- The following Wordpress plugins reuse a vulnerable version of the timthumbphp library By hosting a malicious GIF file with PHP code appended to the end on an ...
# Exploit Title: WordPress TimThumb Plugin - Remote Code Execution # Google Dork: inurl:timthumb ext:php -site:googlecodecom -site:googlecom # Date: 3rd August 2011 # Author: MaXe # Software Link: timthumbgooglecodecom/svn-history/r141/trunk/timthumbphp # Version: 132 # Screenshot: See attachment # Tested on: Windows XP + Apache + PHP ...