HomeMalware & ThreatsShuttle Booking Software 2.0 Cross Site Scripting

Shuttle Booking Software 2.0 Cross Site Scripting

Published on

spot_img

Shuttle Booking Software version 2.0 has been found to have multiple persistent cross site scripting vulnerabilities, according to a recent report. The vulnerabilities were discovered by BugsBD Security Researcher Rahad Chowdhury and have been assigned the identifier CVE-2023-48172.

The cross site scripting vulnerability in Shuttle Booking Software v.2.0 allows a remote attacker to execute arbitrary code via the name, description, title, and address parameters in the index.php page. This means that an attacker could potentially inject malicious code into these parameters, which could then be executed when the page is viewed by another user.

To demonstrate the vulnerability, the researcher provided steps to reproduce the issue. First, the attacker would need to login to the panel. Then, they would use any XSS payload in the “name, description, title, and address” parameters in the Location, Lines, and Users menus. This would result in an XSS pop up, demonstrating the potential impact of the vulnerability.

The researcher also provided a link to a GitHub repository with more information about the exploit, allowing others to further investigate the issue.

The Shuttle Booking Software is a popular solution for managing shuttle services, and the discovery of these vulnerabilities highlights the importance of maintaining security in such software. With the potential for attackers to execute arbitrary code on the affected pages, this vulnerability poses a significant risk to the security and integrity of the software.

It is recommended that users of Shuttle Booking Software version 2.0 take immediate action to address these vulnerabilities. This may include applying patches or updates provided by the vendor, or implementing other security measures to mitigate the risk of exploitation.

In addition, it is crucial for software developers and vendors to prioritize security in their products. Regular security assessments and testing can help identify and address vulnerabilities before they can be exploited by malicious actors. By taking proactive measures to secure their software, vendors can help protect their users and uphold the trust and integrity of their products.

The CVE-2023-48172 identifier has been assigned to these vulnerabilities, and users of Shuttle Booking Software version 2.0 are urged to take prompt action to address this security issue. With the potential for remote code execution, these vulnerabilities pose a significant risk, and immediate action is necessary to mitigate this risk and protect the integrity of the software and its users.

Source link

Latest articles

Python Vulnerability Allows Out-of-Bounds Write on Windows

High-Severity Vulnerability Discovered in Python’s asyncio Module for Windows A significant security vulnerability has been...

Hackers Exploit PowerShell Script to Hijack Telegram Accounts

Cybercriminals have recently adopted a novel approach to hijack Telegram sessions, utilizing a PowerShell...

Void Dokkaebi Hackers Distribute Malware via Phony Job Interviews

Title: Evolving Cyber Threat: Void Dokkaebi's Large-Scale Malware Campaign Through Fake Job Interviews Void Dokkaebi,...

Fake CAPTCHA Scam Sparks SMS Fraud

Emerging Threat: Cybercriminals Exploit Fake CAPTCHA Pages for SMS Fraud In a concerning development in...

More like this

Python Vulnerability Allows Out-of-Bounds Write on Windows

High-Severity Vulnerability Discovered in Python’s asyncio Module for Windows A significant security vulnerability has been...

Hackers Exploit PowerShell Script to Hijack Telegram Accounts

Cybercriminals have recently adopted a novel approach to hijack Telegram sessions, utilizing a PowerShell...

Void Dokkaebi Hackers Distribute Malware via Phony Job Interviews

Title: Evolving Cyber Threat: Void Dokkaebi's Large-Scale Malware Campaign Through Fake Job Interviews Void Dokkaebi,...