Advertisement






PHPJabbers Cleaning Business Software 1.0 CSV Injection

CVE Category Price Severity
CVE-2023-51331 CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer $500 High
Author Risk Exploitation Type Date
Unknown Critical Remote 2024-01-11
CVSS
CVSS:4.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2024010038

Below is a copy:

PHPJabbers Cleaning Business Software 1.0 CSV Injection
# Exploit Title: PHPJabbers Cleaning Business Software v1.0 - CSV Injection
# Date: 19/12/2023
# Exploit Author: BugsBD Limited
# Discover by: Rahad Chowdhury
# Vendor Homepage: https://www.phpjabbers.com/
# Software Link:
https://www.phpjabbers.com/cleaning-business-software/#sectionDemo
# Version: v1.0
# Tested on: Windows 10, Windows 11
# CVE-2023-51331

Descriptions:
PHPJabbers Cleaning Business Software v1.0 is vulnerable to CSV
injection vulnerability which allows an attacker to execute remote
code. The vulnerability exists due to insufficient input validation on
the Unique ID field in the Reservations list that is used to construct
a CSV file.

Steps to Reproduce:
1. Login your panel.
2. Go to Options Menu then click Language then click Labels section.
3. Now use CSV Injection Payload in any field and go to Import/Export.
4. Now click export and open your system.


## Reproduce:
[href](https://github.com/bugsbd/CVE/tree/main/2023/CVE-2023-51331)

Copyright ©2024 Exploitalert.

All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use.