CVE-2021-33353
https://notcve.org/view.php?id=CVE-2021-33353
Directory Traversal vulnerability in Wyomind Help Desk Magento 2 extension v.1.3.6 and before fixed in v.1.3.7 allows attacker to execute arbitrary code via the file attachment directory setting. • https://www.exploit-db.com/exploits/50113 https://www.wyomind.com/magento2/helpdesk-magento-2.html • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •
CVE-2021-33351
https://notcve.org/view.php?id=CVE-2021-33351
Cross Site Scripting Vulnerability in Wyomind Help Desk Magento 2 extension v.1.3.6 and before and fixed in v.1.3.7 allows attackers to escalte privileges via a crafted payload in the ticket message field. • https://www.exploit-db.com/exploits/50113 https://www.wyomind.com/magento2/helpdesk-magento-2.html • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2021-33352
https://notcve.org/view.php?id=CVE-2021-33352
An issue in Wyomind Help Desk Magento 2 extension v.1.3.6 and before fixed in v.1.3.7 allows attacker to execute arbitrary code via a phar file upload in the ticket message field. • https://www.exploit-db.com/exploits/50113 https://www.wyomind.com/magento2/helpdesk-magento-2.html • CWE-434: Unrestricted Upload of File with Dangerous Type •