CSRF exists in the JS Support Ticket 1.1.0 component for Joomla! and allows attackers to inject HTML or edit a ticket.
References
Link | Resource |
---|---|
https://packetstormsecurity.com/files/146135/Joomla-JS-Support-Ticket-1.1.0-Cross-Site-Request-Forgery.html | Exploit Third Party Advisory VDB Entry |
https://www.exploit-db.com/exploits/43912/ | Exploit Third Party Advisory VDB Entry |
https://packetstormsecurity.com/files/146135/Joomla-JS-Support-Ticket-1.1.0-Cross-Site-Request-Forgery.html | Exploit Third Party Advisory VDB Entry |
https://www.exploit-db.com/exploits/43912/ | Exploit Third Party Advisory VDB Entry |
Configurations
History
21 Nov 2024, 04:09
Type | Values Removed | Values Added |
---|---|---|
References | () https://packetstormsecurity.com/files/146135/Joomla-JS-Support-Ticket-1.1.0-Cross-Site-Request-Forgery.html - Exploit, Third Party Advisory, VDB Entry | |
References | () https://www.exploit-db.com/exploits/43912/ - Exploit, Third Party Advisory, VDB Entry |
Information
Published : 2018-01-29 05:29
Updated : 2024-11-21 04:09
NVD link : CVE-2018-6007
Mitre link : CVE-2018-6007
CVE.ORG link : CVE-2018-6007
JSON object : View
Products Affected
joomsky
- js_support_ticket
CWE
CWE-352
Cross-Site Request Forgery (CSRF)