Share
## https://sploitus.com/exploit?id=PACKETSTORM:176496
# Exploit Title: PHPJabbers Restaurant Booking System v3.0 - No Rate Limit  
# Date: 19/12/2023  
# Exploit Author: BugsBD Limited  
# Discover by: Rahad Chowdhury  
# Vendor Homepage: https://www.phpjabbers.com/  
# Software Link:  
https://www.phpjabbers.com/restaurant-booking-system/#sectionDemo  
# Version: v3.0  
# Tested on: Windows 10, Windows 11, Linux  
# CVE-2023-51314  
  
Descriptions:  
PHPJabbers Restaurant Booking System v3.0 is vulnerable to Rate  
limiting. Rate limiting is implemented in web applications and APIs to  
prevent abuse, such as brute-force attacks or excessive requests that  
could lead to resource exhaustion. When a rate limit is bypassed or  
not properly enforced, it opens the door for attackers to carry out  
malicious activities more quickly than intended, potentially leading  
to unauthorized access, data breaches, or service disruption.  
  
Steps to Reproduce:  
  
1. Login to your dashboard.  
2. Goto System Options Menu then open the Email Settings section.  
3. Now use any email and name in the Email address and Name field.  
4. Check your email.  
  
## Reproduce:  
[href](https://github.com/bugsbd/CVE/tree/main/2023/CVE-2023-51314)