Lucene search

K
packetstormRahad Chowdhury, BugsBD LimitedPACKETSTORM:176058
HistoryDec 04, 2023 - 12:00 a.m.

PHPJabbers Appointment Scheduler 3.0 CSV Injection

2023-12-0400:00:00
Rahad Chowdhury, BugsBD Limited
packetstormsecurity.com
111
phpjabbers
appointment scheduler
csv injection
remote code execution
unique id
reservations
input validation
import/export
cve-2023-48841

7.4 High

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

24.9%

`# Exploit Title: PHPJabbers Appointment Scheduler v3.0 - CSV Injection  
# Date: 19/11/2023  
# Exploit Author: BugsBD Limited  
# Discover by: Rahad Chowdhury  
# Vendor Homepage: https://www.phpjabbers.com/  
# Software Link: https://www.phpjabbers.com/appointment-scheduler/  
# Version: v3.0  
# Tested on: Windows 10, Windows 11, MS Office 2010  
# CVE-2023-48841  
  
Descriptions:  
PHPJabbers Appointment Scheduler v3.0 is vulnerable to CSV injection  
vulnerability which allows an attacker to execute remote code. The  
vulnerability exists due to insufficient input validation on the  
Unique ID field in the Reservations list that is used to construct a  
CSV file.  
  
Steps to Reproduce:  
1. Login your panel.  
2. Go to Options Menu then click Language then click Labels section.  
3. Now use CSV Injection Payload in any field and go to Import/Export.  
4. Now click export and open your system.  
  
  
## Reproduce:  
[href](https://github.com/bugsbd/CVE/tree/main/2023/CVE-2023-48841)  
`

7.4 High

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

24.9%

Related for PACKETSTORM:176058