Pradeep Makone wordpress Support Plus Responsive Ticket System version 9.0.2 and earlier contains a SQL Injection vulnerability in the function to get tickets, the parameter email in cookie was injected that can result in filter the parameter. This attack appear to be exploitable via web site, without login. This vulnerability appears to have been fixed in 9.0.3 and later.
References
Link | Resource |
---|---|
https://github.com/00theway/exp/blob/master/wordpress/wpsupportplus.md | Exploit Third Party Advisory |
https://wordpress.org/plugins/wp-support-plus-responsive-ticket-system/#developers | Release Notes Third Party Advisory |
https://wpvulndb.com/vulnerabilities/9041 | Third Party Advisory |
https://github.com/00theway/exp/blob/master/wordpress/wpsupportplus.md | Exploit Third Party Advisory |
https://wordpress.org/plugins/wp-support-plus-responsive-ticket-system/#developers | Release Notes Third Party Advisory |
https://wpvulndb.com/vulnerabilities/9041 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 03:39
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/00theway/exp/blob/master/wordpress/wpsupportplus.md - Exploit, Third Party Advisory | |
References | () https://wordpress.org/plugins/wp-support-plus-responsive-ticket-system/#developers - Release Notes, Third Party Advisory | |
References | () https://wpvulndb.com/vulnerabilities/9041 - Third Party Advisory |
Information
Published : 2018-03-14 13:29
Updated : 2024-11-21 03:39
NVD link : CVE-2018-1000131
Mitre link : CVE-2018-1000131
CVE.ORG link : CVE-2018-1000131
JSON object : View
Products Affected
wpsupportplus
- wp_support_plus_responsive_ticket_system
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')