Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2018-20463 PoC — WordPress JSmol2WP Plugin 安全漏洞

Source
Associated Vulnerability
Title:WordPress JSmol2WP Plugin 安全漏洞 (CVE-2018-20463)
Description:An issue was discovered in the JSmol2WP plugin 1.07 for WordPress. There is an arbitrary file read vulnerability via ../ directory traversal in query=php://filter/resource= in the jsmol.php query string. This can also be used for SSRF.
Description
WordPress JSmol2WP Plugin 1.07版本中存在安全漏洞。攻击者可利用该漏洞读取任意文件。
Readme
# CVE-2018-20463
WordPress JSmol2WP Plugin 1.07版本中存在安全漏洞。攻击者可利用该漏洞读取任意文件。

# Optional Arguments:

  -h, --help            show this help message and exit
  
  -u url, --url url     Target url eg:"http://127.0.0.1"
  
  -f file, --file file  Targets in file eg:"ip.txt"
  
# Use
  
python3 CVE-2018-20463.py -u http://127.0.0.1

python3 CVE-2018-20463.py -f ip.txt

# Link
https://www.henry4e36.top/index.php/archives/96.html
File Snapshot

[4.0K] /data/pocs/b98c70412205c6e502082170cd97e4d91ac4c9fc └── [ 477] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →