# Exploit Title: PHPJabbers Bus Reservation System 1.1 - Reflected XSS # Exploit Author: CraCkEr # Date: 20/07/2023 # Vendor: PHPJabbers # Vendor Homepage: https://www.phpjabbers.com/ # Software Link: https://www.phpjabbers.com/bus-reservation-system/ # Tested on: Windows 10 Pro # Impact: Manipulate the content of the site # CVE: CVE-2023-4111 ## Description The attacker can send to victim a link containing a malicious URL in an email or instant message can perform a wide variety of actions, such as stealing the victim's session token or login credentials Path: /index.php GET parameter 'index' is vulnerable to RXSS https://website/index.php?controller=pjFrontPublic&action=pjActionSearch&locale=1&hide=0&index=[XSS]&session_id= Path: /index.php GET parameter 'pickup_id' is vulnerable to RXSS https://website/index.php?controller=pjFrontEnd&action=pjActionGetLocations&locale=1&hide=0&index=4005&pickup_id=[XSS]&session_id= [-] Done