An issue was discovered in the JSmol2WP plugin 1.07 for WordPress. There is an arbitrary file read vulnerability via ../ directory traversal in query=php://filter/resource= in the jsmol.php query string. This can also be used for SSRF.
References
Link | Resource |
---|---|
https://wpvulndb.com/vulnerabilities/9197 | Exploit Third Party Advisory |
https://www.cbiu.cc/2018/12/WordPress%E6%8F%92%E4%BB%B6jsmol2wp%E6%BC%8F%E6%B4%9E/#%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96-amp-SSRF | Exploit Third Party Advisory |
https://wpvulndb.com/vulnerabilities/9197 | Exploit Third Party Advisory |
https://www.cbiu.cc/2018/12/WordPress%E6%8F%92%E4%BB%B6jsmol2wp%E6%BC%8F%E6%B4%9E/#%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96-amp-SSRF | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2018-12-25 21:29
Updated : 2024-11-21 04:01
NVD link : CVE-2018-20463
Mitre link : CVE-2018-20463
CVE.ORG link : CVE-2018-20463
JSON object : View
Products Affected
jsmol2wp_project
- jsmol2wp
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')