CVE-2023-51320

5.3 MEDIUM

📋 TL;DR

PHPJabbers Night Club Booking Software v1.0 has a CSV injection vulnerability in the Languages section Labels parameters field that allows attackers to inject malicious formulas into CSV files. When users open these CSV files in spreadsheet applications like Excel, the formulas can execute commands, potentially leading to remote code execution. This affects all installations of PHPJabbers Night Club Booking Software v1.0.

💻 Affected Systems

Products:
  • PHPJabbers Night Club Booking Software
Versions: v1.0
Operating Systems: All platforms running PHP
Default Config Vulnerable: ⚠️ Yes
Notes: Requires PHP environment and access to the System Options > Languages section Labels parameters field.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution on client systems when users open malicious CSV files in vulnerable spreadsheet applications, potentially leading to full system compromise.

🟠

Likely Case

Data exfiltration, client-side code execution, or denial of service through malicious CSV formulas when users open exported files.

🟢

If Mitigated

Limited impact if CSV files are opened in applications that don't execute formulas or if proper input validation is implemented.

🌐 Internet-Facing: MEDIUM - Attackers can exploit this if they can access the vulnerable interface, but requires user interaction to open malicious CSV files.
🏢 Internal Only: MEDIUM - Internal attackers or compromised accounts could exploit this, but still requires user interaction with CSV files.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access to the vulnerable interface and user interaction to open malicious CSV files.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None found

Restart Required: No

Instructions:

No official patch available. Implement input validation and sanitization for CSV export functionality.

🔧 Temporary Workarounds

Input Validation for CSV Export

all

Implement server-side validation to sanitize user input in Languages section Labels parameters before CSV export.

Implement PHP input sanitization: htmlspecialchars($input, ENT_QUOTES, 'UTF-8')
Validate input against allowed character patterns

CSV Output Sanitization

all

Prepend single quotes to all CSV fields to prevent formula execution in spreadsheet applications.

Modify CSV generation: $sanitized_value = "'" . $value;
Apply to all user-controlled fields in CSV exports

🧯 If You Can't Patch

  • Restrict access to System Options > Languages section to trusted administrators only
  • Educate users to never open CSV files from untrusted sources in spreadsheet applications that execute formulas

🔍 How to Verify

Check if Vulnerable:

Test by entering formula payloads like =cmd|' /C calc'!A0 in Languages section Labels parameters and exporting CSV

Check Version:

Check software version in admin panel or readme files

Verify Fix Applied:

Verify that formula payloads in CSV exports are properly sanitized or prefixed with single quotes

📡 Detection & Monitoring

Log Indicators:

  • Unusual CSV export requests
  • Multiple failed CSV generation attempts
  • Admin panel access from unusual IPs

Network Indicators:

  • CSV file downloads containing formula patterns
  • Unusual traffic to CSV export endpoints

SIEM Query:

source="web_server" AND (uri="/admin/export_csv" OR uri="/admin/languages") AND (status=200 OR status=500)

🔗 References

📤 Share & Export