CNN.com - Justice

InTechgrity

Saturday, December 31, 2011

Technical details and scripts of the Wordpress Timthumb.php hack | mm

Technical details and scripts of the Wordpress Timthumb.php hack | mm: "Timthumb offers a caching mechanism so that it doesn’t have to continually re-process images. The cache directory lives under the wordpress root and is accessible by visitors to the website.

The ability for a site visitor to load content from a remote website and to make the web server write that remote content to a web accessible directory is the cause of the vulnerability in timthumb.php.

To be clear, timthumb.php does not actually execute any remote malicious code that causes this vulnerability. This was a point of confusion among some commenters in my blog post yesterday. It simply gets a remote file and places it in a web accessible directory."

'via Blog this'

No comments:

Post a Comment