CVE-2018-20463

An issue was discovered in the JSmol2WP plugin 1.07 for WordPress. There is an arbitrary file read vulnerability via ../ directory traversal in query=php://filter/resource= in the jsmol.php query string. This can also be used for SSRF.
Configurations

Configuration 1 (hide)

cpe:2.3:a:jsmol2wp_project:jsmol2wp:1.07:*:*:*:*:wordpress:*:*

History

21 Nov 2024, 04:01

Type Values Removed Values Added
References () https://wpvulndb.com/vulnerabilities/9197 - Exploit, Third Party Advisory () https://wpvulndb.com/vulnerabilities/9197 - Exploit, Third Party Advisory
References () https://www.cbiu.cc/2018/12/WordPress%E6%8F%92%E4%BB%B6jsmol2wp%E6%BC%8F%E6%B4%9E/#%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96-amp-SSRF - Exploit, Third Party Advisory () https://www.cbiu.cc/2018/12/WordPress%E6%8F%92%E4%BB%B6jsmol2wp%E6%BC%8F%E6%B4%9E/#%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96-amp-SSRF - Exploit, Third Party Advisory

Information

Published : 2018-12-25 21:29

Updated : 2024-11-21 04:01


NVD link : CVE-2018-20463

Mitre link : CVE-2018-20463

CVE.ORG link : CVE-2018-20463


JSON object : View

Products Affected

jsmol2wp_project

  • jsmol2wp
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')