Vulnerability CVE-2015-7670


Published: 2017-09-26

Description:
Multiple SQL injection vulnerabilities in includes/update.php in the Support Ticket System plugin before 1.2.1 for WordPress allow remote attackers to execute arbitrary SQL commands via the (1) user or (2) id parameter.

See advisories in our WLB2 database:
Topic
Author
Date
Med.
WordPress Support Ticket System 1.2 SQL Injection
Ibéria Medeiros
08.10.2015

Type:

CWE-89

(Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection'))

CVSS2 => (AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
7.5/10
6.4/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
Support ticket system project -> Support ticket system 

 References:
http://www.securityfocus.com/archive/1/536624/100/0/threaded
https://wordpress.org/plugins/simple-support-ticket-system/#developers
https://wpvulndb.com/vulnerabilities/8207

Copyright 2024, cxsecurity.com

 

Back to Top