vendor:
jssupportticket
by:
qw3rTyTy
8.8
CVSS
HIGH
SQL Injection
89
CWE
Product Name: jssupportticket
Affected Version From: 1.1.6
Affected Version To: 1.1.6
Patch Exists: NO
Related CWE: N/A
CPE: a:joomsky:jssupportticket:1.1.6
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: Debian/nginx/joomla 3.9.0
2019
Joomla! component com_jssupportticket – Authenticated SQL Injection
A SQL injection vulnerability exists in the Joomla! component com_jssupportticket in the admin/models/ticketreply.php file. The vulnerable code is in line 31, where the ticketrandomid parameter is not properly sanitized before being used in a SQL query. An attacker can exploit this vulnerability by sending a specially crafted HTTP request with a malicious ticketrandomid parameter.
Mitigation:
Input validation should be used to prevent SQL injection attacks. All user-supplied input should be validated and filtered before being used in a SQL query.