Pradeep Makone wordpress Support Plus Responsive Ticket System version 9.0.2 and earlier contains a SQL Injection vulnerability in the function to get tickets, the parameter email in cookie was injected that can result in filter the parameter. This attack appear to be exploitable via web site, without login. This vulnerability appears to have been fixed in 9.0.3 and later.
References
Link | Resource |
---|---|
https://wordpress.org/plugins/wp-support-plus-responsive-ticket-system/#developers | Release Notes Third Party Advisory |
https://github.com/00theway/exp/blob/master/wordpress/wpsupportplus.md | Exploit Third Party Advisory |
https://wpvulndb.com/vulnerabilities/9041 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2018-03-14 06:29
Updated : 2018-04-13 06:45
NVD link : CVE-2018-1000131
Mitre link : CVE-2018-1000131
JSON object : View
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Products Affected
wpsupportplus
- wp_support_plus_responsive_ticket_system