phpThumb 'fltr[]' Parameter Command Injection Vulnerability

Summary
The host is running phpThumb and is prone to command injection vulnerability.
Impact
Successful exploitation will allow attacker to inject and execute arbitrary shell commands via specially crafted requests in the context of the web server. Impact Level: Application
Solution
Upgrade to version 1.7.9 or later, For updates refer to http://phpthumb.sourceforge.net/#download
Insight
The flaw is caused by improper validation of user-supplied input via the 'fltr[]' parameter to 'phpThumb.php', which allow attackers to inject and execute arbitrary shell commands via specially crafted requests.
Affected
phpThumb Version 1.7.9
References