• Resolved corischlegel


    My client’s using a theme that includes timthumb.php, which popped up in the quarantined files list on a recent complete scan but Anti-Malware didn’t record it as a timthumb exploit. It’s not in the quarantine folder, and I redownloaded timthumb from the google code site and renamed the original file. Everything’s still working appropriately on the front end, but on a subsequent full scan it still shows up as quarantined (without actually having been quarantined).

    We’re running the current version of the plugin with current definitions.

    Does this sound like a bug, or is there something else amiss with timthumb, as far as Anti-malware is concerned?


Viewing 2 replies - 1 through 2 (of 2 total)
  • Plugin Author Eli


    If the file is showing up in the quarantine that means the the vulnerable timthumb file has been move to /wp-content/uploads/quarantine/ and renamed to a long file name that ends in .GOTMLS

    This is not a bug and you do not need to do anything about files in the quarantine (that’s just a backup in case you need to look at the original file).

    Hope this answers your question. Please let me know if you need anything else.

    Aloha, Eli.

    ok, I was confused – the nomenclature of the quarantined files link doesn’t make it clear that those are the files *in* the quarantine – I thought it had quarantined a new file on each scan and that’s what that message meant.

Viewing 2 replies - 1 through 2 (of 2 total)
  • The topic ‘timthumb.php’ is closed to new replies.