CVE-2023-51325

5.4 MEDIUM

📋 TL;DR

PHPJabbers Shared Asset Booking System v1.0 contains stored cross-site scripting vulnerabilities in the 'title' and 'name' parameters. This allows attackers to inject malicious scripts that execute in users' browsers when viewing affected pages. Organizations using this specific version of the booking system are affected.

💻 Affected Systems

Products:
  • PHPJabbers Shared Asset Booking System
Versions: v1.0
Operating Systems: Any OS running PHP
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the default installation. No special configuration is required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal session cookies, redirect users to malicious sites, perform actions on behalf of authenticated users, or deploy malware through the booking system interface.

🟠

Likely Case

Attackers inject malicious scripts that steal user session cookies or credentials, potentially leading to account compromise and unauthorized access to the booking system.

🟢

If Mitigated

With proper input validation and output encoding, the scripts would be rendered harmless as text rather than executable code.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authentication to access the vulnerable parameters. Public proof-of-concept demonstrates the vulnerability.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not available

Vendor Advisory: Not available

Restart Required: No

Instructions:

No official patch available. Consider upgrading to a newer version if available or implementing workarounds.

🔧 Temporary Workarounds

Input Validation and Output Encoding

all

Implement proper input validation for title and name parameters, and encode all user-controlled output before rendering in HTML.

Content Security Policy

all

Implement a strict Content Security Policy header to prevent execution of inline scripts and restrict script sources.

Header set Content-Security-Policy "default-src 'self'; script-src 'self'" in Apache .htaccess or equivalent

🧯 If You Can't Patch

  • Implement web application firewall rules to block XSS payloads in title and name parameters
  • Disable or restrict access to the booking system until a fix can be implemented

🔍 How to Verify

Check if Vulnerable:

Test by submitting script payloads in title and name fields and checking if they execute when viewing the page.

Check Version:

Check the software version in the admin panel or configuration files.

Verify Fix Applied:

Test with XSS payloads to confirm they are properly sanitized and do not execute.

📡 Detection & Monitoring

Log Indicators:

  • Unusual script-like content in title/name parameters
  • Multiple failed login attempts followed by parameter manipulation

Network Indicators:

  • HTTP requests containing script tags or JavaScript in title/name parameters

SIEM Query:

web_requests WHERE (parameter_name CONTAINS 'title' OR parameter_name CONTAINS 'name') AND parameter_value MATCHES '<script|javascript:|onload=|onerror='

🔗 References

📤 Share & Export