Vulnerability Name: | CVE-2011-4106 (CCN-68981) | ||||||||
Assigned: | 2011-08-03 | ||||||||
Published: | 2011-08-03 | ||||||||
Updated: | 2013-10-28 | ||||||||
Summary: | TimThumb (timthumb.php) before 2.0 does not validate the entire source with the domain white list, which allows remote attackers to upload and execute arbitrary code via a URL containing a white-listed domain in the src parameter, then accessing it via a direct request to the file in the cache directory, as exploited in the wild in August 2011. | ||||||||
CVSS v3 Severity: | 4.6 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L)
| ||||||||
CVSS v2 Severity: | 6.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P) 5.3 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:POC/RL:OF/RC:C)
4.7 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C)
| ||||||||
Vulnerability Type: | CWE-20 | ||||||||
Vulnerability Consequences: | Gain Access | ||||||||
References: | Source: CONFIRM Type: Exploit, Patch http://code.google.com/p/timthumb/issues/detail?id=212 Source: MITRE Type: CNA CVE-2011-4106 Source: CCN Type: DukaPress Web site DukaPress 2.3.3 TimThumb Security Update Source: MISC Type: UNKNOWN http://markmaunder.com/2011/08/01/zero-day-vulnerability-in-many-wordpress-themes/ Source: MISC Type: Patch http://markmaunder.com/2011/08/02/technical-details-and-scripts-of-the-wordpress-timthumb-php-hack/ Source: CCN Type: RAXO Web site RAXO All-mode PRO J1.5 v1.5.0 - Changelog Source: CCN Type: SA45416 TimThumb Domain Name Security Bypass and Insecure Cache Handling Vulnerabilities Source: CCN Type: SA45603 Joomla! RAXO All-mode PRO Module TimThumb Arbitrary File Upload Vulnerability Source: CCN Type: SA45867 WordPress DukaPress Shopping Cart Plugin TimThumb Arbitrary File Upload Vulnerability Source: CCN Type: SA46015 WordPress IGIT Posts Slider Widget Plugin TimThumb Arbitrary File Upload Vulnerability Source: CCN Type: SA46018 WordPress IGIT Related Post With Thumb Plugin TimThumb Arbitrary File Upload Source: CCN Type: SA46079 WordPress A. Gallery Plugin "src" Arbitrary File Upload Source: CCN Type: TimThumb SVN Repository TimThumb Source: CCN Type: WordPress Web site IGIT Related Post With Thumb plugin for WordPress Source: CONFIRM Type: UNKNOWN http://www.binarymoon.co.uk/2011/08/timthumb-2/ Source: EXPLOIT-DB Type: Exploit 17602 Source: EXPLOIT-DB Type: Exploit 17872 Source: MLIST Type: UNKNOWN [oss-security] 20111103 Re: CVE request: wordpress plugin timthumb before 2.0 remote code execution Source: CCN Type: OSVDB ID: 74326 TimThumb src Parameter Domain Name Verification Bypass Source: CCN Type: BID-48963 WordPress Timthumb Plugin 'timthumb' Cache Directory Arbitrary File Upload Vulnerability Source: XF Type: UNKNOWN timthumb-cache-file-upload(68981) Source: EXPLOIT-DB Type: EXPLOIT EDB-ID: 17602 | ||||||||
Vulnerable Configuration: | Configuration 1:![]() | ||||||||
BACK |