CVE-2011-4106
26.10.2013, 16:55
TimThumb (timthumb.php) before 2.0 does not validate the entire source with the domain white list, which allows remote attackers to upload and execute arbitrary code via a URL containing a white-listed domain in the src parameter, then accessing it via a direct request to the file in the cache directory, as exploited in the wild in August 2011.Enginsight
Vendor | Product | Version |
---|---|---|
binarymoon | timthumb | 𝑥 ≤ 1.99 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
References