CVE-2023-24058
https://notcve.org/view.php?id=CVE-2023-24058
Booked Scheduler 2.5.5 allows authenticated users to create and schedule events for any other user via a modified userId value to reservation_save.php. NOTE: 2.5.5 is a version from 2014; the latest version of Booked Scheduler is not affected. However, LabArchives Scheduler (Sep 6, 2022 Feature Release) is affected. Booked Scheduler 2.5.5 permite a los usuarios autenticados crear y programar eventos para cualquier otro usuario a través de un valor de ID de usuario modificado en reservation_save.php. NOTA: 2.5.5 es una versión de 2014; la última versión de Booked Scheduler no se ve afectada. • https://github.com/LibreBooking/app/blob/0a6cb1a9eb84835553c8caf93db2791f8655140f/Pages/Ajax/ReservationSavePage.php#L234-L237 https://github.com/LibreBooking/app/blob/0a6cb1a9eb84835553c8caf93db2791f8655140f/Web/ajax/reservation_save.php https://github.com/LibreBooking/app/tags?after=2.7.1 https://s1n1st3r.gitbook.io/theb10g/booked-scheduler-v2.5.5-vulnerability https://www.bookedscheduler.com/the-future-of-booked https://www.labarchives.com/labarchives-knowledge-base/2022-feature-releases-2 https://www.limswiki.org/index •
CVE-2022-30706
https://notcve.org/view.php?id=CVE-2022-30706
Open redirect vulnerability in Booked versions prior to 3.3 allows a remote unauthenticated attacker to redirect a user to an arbitrary web site and conduct a phishing attack by having a user to access a specially crafted URL. Una vulnerabilidad de redireccionamiento abierto en Booked versiones anteriores a 3.3, permite a un atacante remoto no autenticado redirigir a un usuario a un sitio web arbitrario y conducir un ataque de phishing haciendo que el usuario acceda a una URL especialmente diseñada. • https://jvn.jp/en/jp/JVN75063798 https://www.bookedscheduler.com • CWE-601: URL Redirection to Untrusted Site ('Open Redirect') •
CVE-2019-9581 – Booked Scheduler 2.7.5 - Remote Command Execution (RCE) (Authenticated)
https://notcve.org/view.php?id=CVE-2019-9581
phpscheduleit Booked Scheduler 2.7.5 allows arbitrary file upload via the Favicon field, leading to execution of arbitrary Web/custom-favicon.php PHP code, because Presenters/Admin/ManageThemePresenter.php does not ensure an image file extension. phpscheduleit Booked Scheduler 2.7.5 permite la subida de archivos arbitrarios mediante el campo Favicon, lo que conduce a la ejecución de código PHP arbitrario en Web/custom-favicon.php. Esto se debe a que Presenters/Admin/ManageThemePresenter.php no asegura una extensión de archivo de imagen. • https://www.exploit-db.com/exploits/50594 https://www.exploit-db.com/exploits/46486 http://packetstormsecurity.com/files/165263/Booked-Scheduler-2.7.5-Shell-Upload.html https://pentest.com.tr/exploits/Booked-2-7-5-Remote-Command-Execution-Metasploit.html https://sourceforge.net/p/phpscheduleit/source/ci/c5a86a279d888bd4362e4b4f61acedc054f99c39 • CWE-434: Unrestricted Upload of File with Dangerous Type •