Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20140625122337.06cacb5a@hboeck.de>
Date: Wed, 25 Jun 2014 12:23:37 +0200
From: Hanno Böck <hanno@...eck.de>
To: oss-security@...ts.openwall.com
Subject: Re: CVE request: timthumb remote code execution

On Wed, 25 Jun 2014 11:56:55 +0200
Hanno Böck <hanno@...eck.de> wrote:

> The timthumb code, used by a countless number of wordpress themes, has
> (again) a remote code execution vulnerability:

And before people run aronud screaming and panicking (like I did this
morning) it seems the whole thing is only vulnerable if the webshots
feature is enabled (default is disabled).

So most installations are probably not affected if I understand this
right.

Still worth a CVE :-)

-- 
Hanno Böck
http://hboeck.de/

mail/jabber: hanno@...eck.de
GPG: BBB51E42

Download attachment "signature.asc" of type "application/pgp-signature" (820 bytes)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.