CVE-2023-36134

9.8 CRITICAL

📋 TL;DR

This vulnerability in PHP Jabbers Class Scheduling System 1.0 allows remote attackers to take over user accounts by changing email addresses and passwords without proper verification. Any organization using this software is affected, potentially exposing sensitive scheduling data and user credentials.

💻 Affected Systems

Products:
  • PHP Jabbers Class Scheduling System
Versions: Version 1.0
Operating Systems: Any OS running PHP
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of version 1.0 are vulnerable regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of all user accounts, unauthorized access to sensitive scheduling data, potential data theft or destruction, and privilege escalation to administrative functions.

🟠

Likely Case

Targeted account takeover of specific users, unauthorized access to scheduling information, potential data manipulation or deletion.

🟢

If Mitigated

Limited impact with proper access controls and monitoring, but still represents authentication bypass vulnerability.

🌐 Internet-Facing: HIGH - The vulnerability allows remote exploitation without authentication, making internet-facing instances particularly vulnerable.
🏢 Internal Only: HIGH - Even internal systems are vulnerable to insider threats or compromised internal accounts exploiting this flaw.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability is simple to exploit - attackers can directly modify email/password parameters without authentication. Public proof-of-concept details are available in the referenced Medium article.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://www.phpjabbers.com/class-scheduling-system

Restart Required: No

Instructions:

1. Check vendor website for security updates
2. If patch available, download and apply
3. Test functionality after update
4. Monitor for any issues

🔧 Temporary Workarounds

Input Validation Implementation

all

Add server-side validation for email and password change requests, requiring current password verification

Manual code modification required - no single command

Access Restriction

linux

Restrict access to profile modification endpoints using web server rules or firewall

# Example Apache rule
RewriteRule ^/profile\.php$ - [F]
# Example nginx rule
location ~ /profile\.php$ { deny all; }

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block unauthorized profile modification requests
  • Disable the Class Scheduling System until a fix is available and implement alternative scheduling methods

🔍 How to Verify

Check if Vulnerable:

Attempt to change email or password without providing current credentials via direct API/parameter manipulation

Check Version:

Check software version in admin panel or review installation files for version indicators

Verify Fix Applied:

Test that email/password changes now require current password verification and proper authentication

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed authentication attempts followed by successful profile modifications
  • Profile update requests from unusual IP addresses
  • Email/password change requests without corresponding authentication logs

Network Indicators:

  • Unusual patterns of POST requests to profile.php endpoint
  • Traffic spikes to profile modification endpoints

SIEM Query:

source="web_logs" AND (uri="/profile.php" OR uri LIKE "%/profile%") AND (status=200 OR status=302) AND NOT (referer CONTAINS "authenticate" OR user_agent CONTAINS "bot")

🔗 References

📤 Share & Export