CVE-2023-48830

8.8 HIGH

📋 TL;DR

Shuttle Booking Software 2.0 contains a CSV injection vulnerability in the Languages export functionality. This allows attackers to inject malicious formulas into exported CSV files, which can execute arbitrary code when opened in spreadsheet applications. Organizations using this software for shuttle booking management are affected.

💻 Affected Systems

Products:
  • Shuttle Booking Software
Versions: Version 2.0
Operating Systems: Any OS running PHP web applications
Default Config Vulnerable: ⚠️ Yes
Notes: Requires the Languages export feature to be accessible and users to export/import CSV files.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution on client systems when users open malicious CSV exports, potentially leading to full system compromise, data theft, or ransomware deployment.

🟠

Likely Case

Formula injection leading to command execution on client machines, data exfiltration, or spreadsheet manipulation when users open exported files.

🟢

If Mitigated

Limited impact with proper user training about opening untrusted CSV files and application-level input validation.

🌐 Internet-Facing: HIGH - The export functionality is typically accessible via web interface, making it exploitable remotely.
🏢 Internal Only: MEDIUM - Internal users could still be tricked into opening malicious exports, but attack surface is reduced.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit details published on Packet Storm Security. Requires user interaction to open malicious CSV file.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://www.phpjabbers.com/shuttle-booking-software/

Restart Required: No

Instructions:

Check vendor website for updates. If patch available: 1. Backup current installation 2. Download latest version 3. Replace vulnerable files 4. Test functionality

🔧 Temporary Workarounds

Input Sanitization

all

Add server-side validation to sanitize CSV export inputs and escape formula characters

Implement PHP input filtering for CSV exports: htmlspecialchars() or custom sanitization

Disable CSV Export

all

Temporarily disable the Languages CSV export functionality

Comment out or remove CSV export code in affected PHP files

🧯 If You Can't Patch

  • Implement web application firewall rules to block CSV injection payloads
  • Educate users to never open CSV files directly in spreadsheet applications - use plain text editors instead

🔍 How to Verify

Check if Vulnerable:

Test by exporting Languages data with formula payloads like =cmd|' /C calc'!A0 and checking if formulas persist in CSV output

Check Version:

Check software version in admin panel or readme files

Verify Fix Applied:

Verify exported CSV files properly escape formula characters and show as plain text in spreadsheet applications

📡 Detection & Monitoring

Log Indicators:

  • Multiple CSV export requests with unusual payloads
  • Large export files with formula patterns

Network Indicators:

  • HTTP POST requests to export endpoints with formula characters
  • CSV downloads containing =, +, - or @ at start of cells

SIEM Query:

web_requests url="*export*" AND (body="=cmd" OR body="=HYPERLINK" OR body="@")

🔗 References

📤 Share & Export