Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2018-20462 PoC — WordPress JSmol2WP Plugin 跨站脚本漏洞

Source
Associated Vulnerability
Title:WordPress JSmol2WP Plugin 跨站脚本漏洞 (CVE-2018-20462)
Description:WordPress是WordPress软件基金会的一套使用PHP语言开发的博客平台,该平台支持在PHP和MySQL的服务器上架设个人博客网站。JSmol2WP Plugin是使用在其中的一个支持查看3D化学结构的插件。 WordPress JSmol2WP Plugin 1.07版本中存在跨站脚本漏洞。远程攻击者可通过向jsmol.php文件发送‘data’参数利用该漏洞注入任意Web脚本或HTML。
Description
WordPress JSmol2WP version 1.07 and earlier is vulnerable to cross-site scripting and allows remote attackers to inject arbitrary web script or HTML via the jsmol.php data parameter.
File Snapshot

id: CVE-2018-20462 info: name: WordPress JSmol2WP <=1.07 - Cross-Site Scripting author: daffain ...
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.