PHPJabbers Cleaning Business Software 1.0 CSV Injection

2024.01.11
Risk: Low
Local: No
Remote: Yes
CWE: N/A

# Exploit Title: PHPJabbers Cleaning Business Software v1.0 - CSV Injection # Date: 19/12/2023 # Exploit Author: BugsBD Limited # Discover by: Rahad Chowdhury # Vendor Homepage: https://www.phpjabbers.com/ # Software Link: https://www.phpjabbers.com/cleaning-business-software/#sectionDemo # Version: v1.0 # Tested on: Windows 10, Windows 11 # CVE-2023-51331 Descriptions: PHPJabbers Cleaning Business Software v1.0 is vulnerable to CSV injection vulnerability which allows an attacker to execute remote code. The vulnerability exists due to insufficient input validation on the Unique ID field in the Reservations list that is used to construct a CSV file. Steps to Reproduce: 1. Login your panel. 2. Go to Options Menu then click Language then click Labels section. 3. Now use CSV Injection Payload in any field and go to Import/Export. 4. Now click export and open your system. ## Reproduce: [href](https://github.com/bugsbd/CVE/tree/main/2023/CVE-2023-51331)


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top