CVE-2024-13606

7.5 HIGH

📋 TL;DR

The JS Help Desk WordPress plugin exposes sensitive support ticket attachments to unauthenticated attackers through an insecure directory. All WordPress sites using this plugin up to version 2.8.8 are affected, allowing attackers to download files containing potentially confidential information.

💻 Affected Systems

Products:
  • JS Help Desk – The Ultimate Help Desk & Support Plugin for WordPress
Versions: All versions up to and including 2.8.8
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in default installation; no special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers download all support ticket attachments containing sensitive customer data, financial information, or credentials, leading to data breach and regulatory penalties.

🟠

Likely Case

Attackers systematically download accessible files to harvest personal information, support communications, and potentially credentials from ticket attachments.

🟢

If Mitigated

With proper access controls, only authorized users can access support ticket data, preventing unauthorized file downloads.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only web access to the vulnerable directory path; no authentication or special tools needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version after 2.8.8

Vendor Advisory: https://plugins.trac.wordpress.org/browser/js-support-ticket

Restart Required: No

Instructions:

1. Log into WordPress admin panel
2. Navigate to Plugins → Installed Plugins
3. Find 'JS Help Desk' plugin
4. Click 'Update Now' if update available
5. If no update available, deactivate and remove plugin
6. Install latest version from WordPress repository

🔧 Temporary Workarounds

Restrict directory access via .htaccess

Apache

Block public access to the vulnerable directory using web server access controls

# Add to .htaccess in /wp-content/uploads/jssupportticketdata/
Order deny,allow
Deny from all

Restrict directory access via nginx config

nginx

Block public access to the vulnerable directory using nginx location block

# Add to nginx site configuration
location ~* /wp-content/uploads/jssupportticketdata/ {
    deny all;
    return 403;
}

🧯 If You Can't Patch

  • Disable or remove the JS Help Desk plugin immediately
  • Implement web application firewall rules to block access to /wp-content/uploads/jssupportticketdata/ paths

🔍 How to Verify

Check if Vulnerable:

Attempt to access http://[your-domain]/wp-content/uploads/jssupportticketdata/ in a web browser. If directory listing or files are accessible without authentication, the site is vulnerable.

Check Version:

Check WordPress admin → Plugins → JS Help Desk version, or examine wp-content/plugins/js-support-ticket/js-support-ticket.php header for version number

Verify Fix Applied:

After updating, attempt the same access test. You should receive a 403 Forbidden error or be redirected to login.

📡 Detection & Monitoring

Log Indicators:

  • Multiple 200 OK responses to /wp-content/uploads/jssupportticketdata/ paths from unauthenticated users
  • Unusual file download patterns from the jssupportticketdata directory

Network Indicators:

  • HTTP requests to /wp-content/uploads/jssupportticketdata/ from external IPs without preceding authentication requests

SIEM Query:

source="web_logs" AND uri_path="/wp-content/uploads/jssupportticketdata/*" AND http_status=200 AND NOT user_agent="bot|crawler" | stats count by src_ip

🔗 References

📤 Share & Export