Overview
The Awesome Support – WordPress HelpDesk & Support Plugin is subject to a critical vulnerability that exposes sensitive information to unauthenticated attackers. This vulnerability, designated as CVE-2024-13567, affects all versions of the plugin up to and including 6.3.1. Given the widespread use of WordPress and its associated plugins, this vulnerability potentially puts a significant number of websites and their data at risk.
Vulnerability Summary
CVE ID: CVE-2024-13567
Severity: High (7.5 CVSS)
Attack Vector: Network
Privileges Required: None
User Interaction: None
Impact: Potential system compromise and data leakage
Affected Products
A new way to communicate
Ameeba Chat is built on encrypted identity, not personal profiles.
Message, call, share files, and coordinate with identities kept separate.
- • Encrypted identity
- • Ameeba Chat authenticates access
- • Aliases and categories
- • End-to-end encrypted chat, calls, and files
- • Secure notes for sensitive information
Private communication, rethought.
Product | Affected Versions
Awesome Support – WordPress HelpDesk & Support Plugin | Up to and including 6.3.1
How the Exploit Works
The vulnerability resides in the ‘awesome-support’ directory, which could store file attachments included in support tickets. An unauthenticated attacker can exploit this vulnerability by making a specific network request to the ‘/wp-content/uploads/awesome-support’ directory, thereby extracting stored data. The extracted data may contain sensitive information, leading to a potential system compromise and data leakage.
Conceptual Example Code
An attacker might exploit the vulnerability using a HTTP GET request like this:
GET /wp-content/uploads/awesome-support HTTP/1.1
Host: vulnerable-website.com
This request would retrieve the contents of the ‘awesome-support’ directory, potentially including sensitive data.
Mitigation
Users of the Awesome Support – WordPress HelpDesk & Support Plugin are advised to update to the latest version of the plugin, which includes a patch for this vulnerability. As a temporary mitigation, users can also use a Web Application Firewall (WAF) or Intrusion Detection System (IDS) to detect and block attempted exploits.
