CVE-2022-30706
https://notcve.org/view.php?id=CVE-2022-30706
Open redirect vulnerability in Booked versions prior to 3.3 allows a remote unauthenticated attacker to redirect a user to an arbitrary web site and conduct a phishing attack by having a user to access a specially crafted URL. Una vulnerabilidad de redireccionamiento abierto en Booked versiones anteriores a 3.3, permite a un atacante remoto no autenticado redirigir a un usuario a un sitio web arbitrario y conducir un ataque de phishing haciendo que el usuario acceda a una URL especialmente diseñada. • https://jvn.jp/en/jp/JVN75063798 https://www.bookedscheduler.com • CWE-601: URL Redirection to Untrusted Site ('Open Redirect') •
CVE-2019-9581 – Booked Scheduler 2.7.5 - Remote Command Execution (RCE) (Authenticated)
https://notcve.org/view.php?id=CVE-2019-9581
phpscheduleit Booked Scheduler 2.7.5 allows arbitrary file upload via the Favicon field, leading to execution of arbitrary Web/custom-favicon.php PHP code, because Presenters/Admin/ManageThemePresenter.php does not ensure an image file extension. phpscheduleit Booked Scheduler 2.7.5 permite la subida de archivos arbitrarios mediante el campo Favicon, lo que conduce a la ejecución de código PHP arbitrario en Web/custom-favicon.php. Esto se debe a que Presenters/Admin/ManageThemePresenter.php no asegura una extensión de archivo de imagen. • https://www.exploit-db.com/exploits/50594 https://www.exploit-db.com/exploits/46486 http://packetstormsecurity.com/files/165263/Booked-Scheduler-2.7.5-Shell-Upload.html https://pentest.com.tr/exploits/Booked-2-7-5-Remote-Command-Execution-Metasploit.html https://sourceforge.net/p/phpscheduleit/source/ci/c5a86a279d888bd4362e4b4f61acedc054f99c39 • CWE-434: Unrestricted Upload of File with Dangerous Type •