J-Security Center

Title: phpThumb() 'fltr[]' Parameter Command Injection Vulnerability

Severity: HIGH

Description:

phpThumb() is an application used to create thumbnails from images.

The application is prone to a command-injection vulnerability because it fails to adequately sanitize user-supplied input to the 'fltr[]' parameter in the 'phpThumb.php' script.

Attackers can exploit this issue to execute arbitrary commands in the context of the webserver.

Note that successful exploitation requires 'ImageMagick' to be installed.

phpThumb() 1.7.9 is affected; other versions may also be vulnerable.

Affected Products:

  • phpThumb phpThumb() 1.7.9

References:

Juniper Networks provides this content via a wide variety of sources and production methods. If notified of errors or omissions in the content of this page, Juniper Networks, at its discretion, will modify or remove the page or leave the content as is, depending on various factors including but not limited to the reputation and authority of the party providing the notification. Please use the contact information displayed elsewhere on this page to report any errors or omissions regarding the content on this page.