NA

CVE-2021-42949

Published: 16/09/2022 Updated: 08/08/2023
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 0

Vulnerability Summary

The component controlla_login function in HotelDruid Hotel Management Software v3.0.3 generates a predictable session token, allowing malicious users to bypass authentication via bruteforce attacks.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

digitaldruid hoteldruid 3.0.3

Github Repositories

CVE-2021-42949 The component controlla_login function in HotelDruid Hotel Management Software v303 generates a predictable session token, allowing attackers to bypass authentication via bruteforce attacks The session id is dynamically created at each login using the following generalized syntax: {date}{time}{100000-999999}{incremented login attempts} These values can be gu

TryHackMe HotelKiosk Official Writeup I created the HotelKiosk box on TryHackMe to highlight my first two CVEs (CVE-2021-42949 and CVE-2021-42948) found from inspiration through TheMayor's blog post I Was Bored One NIght and Found Two CVEs I also drew inspiration from John Hammond's Kiosk Breakout YouTube series where he covers the setup and escape of Windows native