PHPJabbers Appointment Scheduler 3.0 CSV Injection
2023-12-4 23:5:26 Author: packetstormsecurity.com(查看原文) 阅读量:9 收藏

# Exploit Title: PHPJabbers Appointment Scheduler v3.0 - CSV Injection
# Date: 19/11/2023
# Exploit Author: BugsBD Limited
# Discover by: Rahad Chowdhury
# Vendor Homepage: https://www.phpjabbers.com/
# Software Link: https://www.phpjabbers.com/appointment-scheduler/
# Version: v3.0
# Tested on: Windows 10, Windows 11, MS Office 2010
# CVE-2023-48841

Descriptions:
PHPJabbers Appointment Scheduler v3.0 is vulnerable to CSV injection
vulnerability which allows an attacker to execute remote code. The
vulnerability exists due to insufficient input validation on the
Unique ID field in the Reservations list that is used to construct a
CSV file.

Steps to Reproduce:
1. Login your panel.
2. Go to Options Menu then click Language then click Labels section.
3. Now use CSV Injection Payload in any field and go to Import/Export.
4. Now click export and open your system.

## Reproduce:
[href](https://github.com/bugsbd/CVE/tree/main/2023/CVE-2023-48841)


文章来源: https://packetstormsecurity.com/files/176058/phpjabbersas30-csvinject.txt
如有侵权请联系:admin#unsafe.sh