An issue was discovered in the JSmol2WP plugin 1.07 for WordPress. There is an arbitrary file read vulnerability via ../ directory traversal in query=php://filter/resource= in the jsmol.php query string. This can also be used for SSRF.
References
Link | Resource |
---|---|
https://www.cbiu.cc/2018/12/WordPress%E6%8F%92%E4%BB%B6jsmol2wp%E6%BC%8F%E6%B4%9E/#%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96-amp-SSRF | Exploit Third Party Advisory |
https://wpvulndb.com/vulnerabilities/9197 | Exploit Third Party Advisory |
Configurations
Information
Published : 2018-12-25 13:29
Updated : 2019-01-09 08:02
NVD link : CVE-2018-20463
Mitre link : CVE-2018-20463
JSON object : View
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Products Affected
jsmol2wp_project
- jsmol2wp