CVE-2011-4106
Severity CVSS v4.0:
Pending analysis
Type:
CWE-20
Input Validation
Publication date:
26/10/2013
Last modified:
11/04/2025
Description
TimThumb (timthumb.php) before 2.0 does not validate the entire source with the domain white list, which allows remote attackers to upload and execute arbitrary code via a URL containing a white-listed domain in the src parameter, then accessing it via a direct request to the file in the cache directory, as exploited in the wild in August 2011.
Impact
Base Score 2.0
6.80
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:binarymoon:timthumb:*:*:*:*:*:*:*:* | 1.99 (including) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://code.google.com/p/timthumb/issues/detail?id=212
- http://markmaunder.com/2011/08/01/zero-day-vulnerability-in-many-wordpress-themes/
- http://markmaunder.com/2011/08/02/technical-details-and-scripts-of-the-wordpress-timthumb-php-hack/
- http://www.binarymoon.co.uk/2011/08/timthumb-2/
- http://www.exploit-db.com/exploits/17602
- http://www.exploit-db.com/exploits/17872
- http://www.openwall.com/lists/oss-security/2011/11/03/4
- http://code.google.com/p/timthumb/issues/detail?id=212
- http://markmaunder.com/2011/08/01/zero-day-vulnerability-in-many-wordpress-themes/
- http://markmaunder.com/2011/08/02/technical-details-and-scripts-of-the-wordpress-timthumb-php-hack/
- http://www.binarymoon.co.uk/2011/08/timthumb-2/
- http://www.exploit-db.com/exploits/17602
- http://www.exploit-db.com/exploits/17872
- http://www.openwall.com/lists/oss-security/2011/11/03/4