Описание
TimThumb (timthumb.php) before 2.0 does not validate the entire source with the domain white list, which allows remote attackers to upload and execute arbitrary code via a URL containing a white-listed domain in the src parameter, then accessing it via a direct request to the file in the cache directory, as exploited in the wild in August 2011.
Ссылки
- ExploitPatch
- Patch
- Exploit
- Exploit
- ExploitPatch
- Patch
- Exploit
- Exploit
Уязвимые конфигурации
Конфигурация 1Версия до 1.99 (включая)
cpe:2.3:a:binarymoon:timthumb:*:*:*:*:*:*:*:*
EPSS
Процентиль: 96%
0.26332
Средний
6.8 Medium
CVSS2
Дефекты
CWE-20
Связанные уязвимости
github
больше 3 лет назад
TimThumb (timthumb.php) before 2.0 does not validate the entire source with the domain white list, which allows remote attackers to upload and execute arbitrary code via a URL containing a white-listed domain in the src parameter, then accessing it via a direct request to the file in the cache directory, as exploited in the wild in August 2011.
EPSS
Процентиль: 96%
0.26332
Средний
6.8 Medium
CVSS2
Дефекты
CWE-20