CVE-2024-13606
📋 TL;DR
The JS Help Desk WordPress plugin exposes sensitive support ticket attachments to unauthenticated attackers through an insecure directory. All WordPress sites using this plugin up to version 2.8.8 are affected, allowing attackers to download files containing potentially confidential information.
💻 Affected Systems
- JS Help Desk – The Ultimate Help Desk & Support Plugin for WordPress
📦 What is this software?
Js Help Desk by Wiselyhub
⚠️ Risk & Real-World Impact
Worst Case
Attackers download all support ticket attachments containing sensitive customer data, financial information, or credentials, leading to data breach and regulatory penalties.
Likely Case
Attackers systematically download accessible files to harvest personal information, support communications, and potentially credentials from ticket attachments.
If Mitigated
With proper access controls, only authorized users can access support ticket data, preventing unauthorized file downloads.
🎯 Exploit Status
Exploitation requires only web access to the vulnerable directory path; no authentication or special tools needed.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Version after 2.8.8
Vendor Advisory: https://plugins.trac.wordpress.org/browser/js-support-ticket
Restart Required: No
Instructions:
1. Log into WordPress admin panel
2. Navigate to Plugins → Installed Plugins
3. Find 'JS Help Desk' plugin
4. Click 'Update Now' if update available
5. If no update available, deactivate and remove plugin
6. Install latest version from WordPress repository
🔧 Temporary Workarounds
Restrict directory access via .htaccess
ApacheBlock public access to the vulnerable directory using web server access controls
# Add to .htaccess in /wp-content/uploads/jssupportticketdata/
Order deny,allow
Deny from all
Restrict directory access via nginx config
nginxBlock public access to the vulnerable directory using nginx location block
# Add to nginx site configuration
location ~* /wp-content/uploads/jssupportticketdata/ {
deny all;
return 403;
}
🧯 If You Can't Patch
- Disable or remove the JS Help Desk plugin immediately
- Implement web application firewall rules to block access to /wp-content/uploads/jssupportticketdata/ paths
🔍 How to Verify
Check if Vulnerable:
Attempt to access http://[your-domain]/wp-content/uploads/jssupportticketdata/ in a web browser. If directory listing or files are accessible without authentication, the site is vulnerable.
Check Version:
Check WordPress admin → Plugins → JS Help Desk version, or examine wp-content/plugins/js-support-ticket/js-support-ticket.php header for version number
Verify Fix Applied:
After updating, attempt the same access test. You should receive a 403 Forbidden error or be redirected to login.
📡 Detection & Monitoring
Log Indicators:
- Multiple 200 OK responses to /wp-content/uploads/jssupportticketdata/ paths from unauthenticated users
- Unusual file download patterns from the jssupportticketdata directory
Network Indicators:
- HTTP requests to /wp-content/uploads/jssupportticketdata/ from external IPs without preceding authentication requests
SIEM Query:
source="web_logs" AND uri_path="/wp-content/uploads/jssupportticketdata/*" AND http_status=200 AND NOT user_agent="bot|crawler" | stats count by src_ip