CVE-2024-51076

6.1 MEDIUM

📋 TL;DR

A reflected cross-site scripting (XSS) vulnerability in PHPGurukul Online DJ Booking Management System 1.0 allows attackers to inject malicious scripts via the 'searchdata' parameter in the booking search admin page. This enables execution of arbitrary JavaScript in victims' browsers when they visit a crafted URL. Administrators using the vulnerable admin interface are primarily affected.

💻 Affected Systems

Products:
  • PHPGurukul Online DJ Booking Management System
Versions: 1.0
Operating Systems: Any OS running PHP
Default Config Vulnerable: ⚠️ Yes
Notes: Requires admin access to the /odms/admin/booking-search.php page. The vulnerability is in the default installation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal admin session cookies, hijack admin accounts, deface the website, or redirect users to malicious sites, potentially leading to complete system compromise if admin privileges are abused.

🟠

Likely Case

Session hijacking of admin accounts leading to unauthorized access to the booking management system, data theft, or website defacement.

🟢

If Mitigated

Limited impact with proper input validation and output encoding, potentially only causing minor UI disruption.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires tricking an admin into clicking a malicious link. The GitHub reference contains proof-of-concept details.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Unknown

Restart Required: No

Instructions:

No official patch available. Implement input validation and output encoding in /odms/admin/booking-search.php for the 'searchdata' parameter.

🔧 Temporary Workarounds

Input Validation and Output Encoding

all

Sanitize the searchdata parameter by validating input and encoding output to prevent script execution.

Edit /odms/admin/booking-search.php to add: htmlspecialchars($_GET['searchdata'], ENT_QUOTES, 'UTF-8') around the parameter usage

Web Application Firewall (WAF) Rules

all

Deploy WAF rules to block XSS payloads in the searchdata parameter.

Configure WAF to filter: <script>, javascript:, onload=, etc. in GET parameters

🧯 If You Can't Patch

  • Restrict access to /odms/admin/ to trusted IP addresses only using .htaccess or firewall rules.
  • Implement Content Security Policy (CSP) headers to mitigate XSS impact by restricting script execution sources.

🔍 How to Verify

Check if Vulnerable:

Test by accessing /odms/admin/booking-search.php?searchdata=<script>alert('XSS')</script> and check if script executes in browser.

Check Version:

Check system documentation or admin panel for version info; no standard command available.

Verify Fix Applied:

After applying fixes, test with the same payload; script should not execute and should be displayed as plain text.

📡 Detection & Monitoring

Log Indicators:

  • HTTP GET requests to /odms/admin/booking-search.php with script tags or JavaScript in searchdata parameter

Network Indicators:

  • Unusual outbound connections from admin sessions after visiting booking-search.php

SIEM Query:

source="web_logs" AND uri_path="/odms/admin/booking-search.php" AND query_string="*searchdata=*<script>*"

🔗 References

📤 Share & Export