Zero-day vulnerabilities discovered: 1
Arbitrary file upload
The vulnerability allows a remote attacker to execute arbitrary PHP code on the target system.
The vulnerability exists due to improper storing of content in the cache directory when processing input. A remote attacker can send a specially crafted HTTP request containing a white-listed domain in the src parameter, upload a malicious PHP script and execute arbitrary PHP code.
Successful exploitation of the vulnerability may allow an attacker to execute arbitrary PHP code on the vulnerable system.
Note: the vulnerability was being actively exploited.
The exploit was announced by Mark Maunder.
Software: TimThumb
Links:
http://www.openwall.com/lists/oss-security/2011/11/03/4
https://www.binarymoon.co.uk/2011/08/timthumb-2/
http://markmaunder.com/2011/08/01/zero-day-vulnerability-in-many-wordpress-themes/
http://markmaunder.com/2011/08/02/technical-details-and-scripts-of-the-wordpress-timthumb-php-hack/
https://www.binarymoon.co.uk/2011/08/timthumb-2/
https://www.heise.de/security/meldung/Tausende-WordPress-Blogs-zur-Verbreitung-von-Schadcode-genutzt...
https://www.malwareremovalservice.com/cve-2011-4106/