Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20140625115655.464dc0ad@hboeck.de>
Date: Wed, 25 Jun 2014 11:56:55 +0200
From: Hanno Böck <hanno@...eck.de>
To: oss-security@...ts.openwall.com
Subject: CVE request: timthumb remote code execution

The timthumb code, used by a countless number of wordpress themes, has
(again) a remote code execution vulnerability:
http://seclists.org/fulldisclosure/2014/Jun/117

All details there.

This affects the very latest upstream version 2.8.13, I just opened an
upstream bug:
https://code.google.com/p/timthumb/issues/detail?id=485&thanks=485&ts=1403690188

No fix available at the moment.

-- 
Hanno Böck
http://hboeck.de/

mail/jabber: hanno@...eck.de
GPG: BBB51E42

Download attachment "signature.asc" of type "application/pgp-signature" (820 bytes)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.