Lucene search

K
packetstormCraCkErPACKETSTORM:173927
HistoryAug 03, 2023 - 12:00 a.m.

PHPJabbers Bus Reservation System 1.1 Cross Site Scripting

2023-08-0300:00:00
CraCkEr
packetstormsecurity.com
95
exploit
cross site scripting
phpjabbers
reflected xss
vulnerable parameter
impact
manipulation
session token
login credentials
cve-2023-4111
email
instant message
url
windows 10 pro
tested

0.003 Low

EPSS

Percentile

66.1%

`# Exploit Title: PHPJabbers Bus Reservation System 1.1 - Reflected XSS  
# Exploit Author: CraCkEr  
# Date: 20/07/2023  
# Vendor: PHPJabbers  
# Vendor Homepage: https://www.phpjabbers.com/  
# Software Link: https://www.phpjabbers.com/bus-reservation-system/  
# Tested on: Windows 10 Pro  
# Impact: Manipulate the content of the site  
# CVE: CVE-2023-4111  
  
  
## Description  
  
The attacker can send to victim a link containing a malicious URL in an email or instant message  
can perform a wide variety of actions, such as stealing the victim's session token or login credentials  
  
  
  
Path: /index.php  
  
GET parameter 'index' is vulnerable to RXSS  
  
https://website/index.php?controller=pjFrontPublic&action=pjActionSearch&locale=1&hide=0&index=[XSS]&session_id=  
  
Path: /index.php  
  
GET parameter 'pickup_id' is vulnerable to RXSS  
  
https://website/index.php?controller=pjFrontEnd&action=pjActionGetLocations&locale=1&hide=0&index=4005&pickup_id=[XSS]&session_id=  
  
  
[-] Done  
`

0.003 Low

EPSS

Percentile

66.1%

Related for PACKETSTORM:173927