CVE-2023-51333

8.8 HIGH

📋 TL;DR

PHPJabbers Cinema Booking System v1.0 has a CSV injection vulnerability that allows attackers to execute arbitrary code on the server. This affects administrators who can access the System Options Languages section. Attackers can craft malicious CSV content that gets executed when exported.

💻 Affected Systems

Products:
  • PHPJabbers Cinema Booking System
Versions: v1.0
Operating Systems: Any OS running PHP
Default Config Vulnerable: ⚠️ Yes
Notes: Requires administrator access to System Options Languages section to exploit.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full remote code execution leading to complete system compromise, data theft, and lateral movement within the network.

🟠

Likely Case

Limited code execution within web application context, potentially allowing file system access, database manipulation, or further exploitation.

🟢

If Mitigated

No impact if proper input validation and output encoding are implemented, or if the vulnerable feature is disabled.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploit requires authenticated admin access. Public proof-of-concept demonstrates CSV injection technique.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v1.1 or later

Vendor Advisory: https://www.phpjabbers.com/cinema-booking-system/

Restart Required: No

Instructions:

1. Download latest version from PHPJabbers website. 2. Backup current installation. 3. Replace vulnerable files with patched version. 4. Verify CSV export functionality works without code injection.

🔧 Temporary Workarounds

Disable CSV Export

all

Remove or restrict access to CSV export functionality in System Options Languages section.

Input Validation

all

Implement server-side validation to sanitize CSV content and prevent formula injection.

🧯 If You Can't Patch

  • Restrict admin access to trusted IP addresses only
  • Implement web application firewall rules to block CSV formula injection patterns

🔍 How to Verify

Check if Vulnerable:

Test CSV export from System Options Languages section with payload like =cmd|' /C calc'!A0

Check Version:

Check version in admin panel or readme.txt file

Verify Fix Applied:

Attempt CSV injection with test payloads and verify they are properly sanitized or rejected.

📡 Detection & Monitoring

Log Indicators:

  • Unusual CSV export activity
  • Admin panel access from unexpected IPs
  • System command execution in web logs

Network Indicators:

  • HTTP POST requests to CSV export endpoints with formula-like payloads

SIEM Query:

web_requests WHERE url_path CONTAINS 'csv' AND request_body CONTAINS '=cmd' OR request_body CONTAINS '=HYPERLINK'

🔗 References

📤 Share & Export