Advertisement






PHPJabbers Cleaning Business Software 1.0 Cross Site Scripting

CVE Category Price Severity
CVE-2023-51328 CWE-79 $500 High
Author Risk Exploitation Type Date
Unknown High Remote 2024-01-11
CVSS
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2024010040

Below is a copy:

PHPJabbers Cleaning Business Software 1.0 Cross Site Scripting
# Exploit Title: PHPJabbers Cleaning Business Software v1.0 - Multiple
Stored XSS
# Date: 19/12/2023
# Exploit Author: BugsBD Limited
# Discover by: Rahad Chowdhury
# Vendor Homepage: https://www.phpjabbers.com/
# Software Link:
https://www.phpjabbers.com/cleaning-business-software/#sectionDemo
# Version: v1.0
# Tested on: Windows 10, Windows 11, Linux
# CVE-2023-51328

Descriptions:
PHPJabbers Cleaning Business Software v1.0 is vulnerable to Multiple
Stored Cross-Site Scripting. Multiple Stored XSS is a type of security
vulnerability that occurs when an application or website allows an
attacker to inject malicious scripts into the content that is
permanently stored on the server.

Steps to Reproduce:
1. Login your panel.
2. Vulnerable parameters are "c_name, name".
3. Go to System Users Menu then click add user.
4. Then use any XSS Payload in "Name" input field and Save.
5. You will see xss popup.

## Reproduce:
[href](https://github.com/bugsbd/CVE/tree/main/2023/CVE-2023-51328)

Copyright ©2024 Exploitalert.

All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use.