TimThumb (timthumb.php) before 2.0 does not validate the entire source with the domain white list, which allows remote attackers to upload and execute arbitrary code via a URL containing a white-listed domain in the src parameter, then accessing it via a direct request to the file in the cache directory, as exploited in the wild in August 2011.
References
Configurations
History
No history.
Information
Published : 2013-10-26 16:55
Updated : 2024-02-04 18:16
NVD link : CVE-2011-4106
Mitre link : CVE-2011-4106
CVE.ORG link : CVE-2011-4106
JSON object : View
Products Affected
binarymoon
- timthumb
CWE
CWE-20
Improper Input Validation