8.8
CVSSv3

CVE-2022-22909

Published: 03/03/2022 Updated: 09/03/2022
CVSS v2 Base Score: 6.5 | Impact Score: 6.4 | Exploitability Score: 8
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 580
Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P

Vulnerability Summary

HotelDruid v3.0.3 exists to contain a remote code execution (RCE) vulnerability which is exploited via an attacker inserting a crafted payload into the name field under the Create New Room module.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

digitaldruid hoteldruid 3.0.3

Vendor Advisories

Debian Bug report logs - #1006750 hoteldruid: CVE-2022-22909 - remote code execution vulnerability in Create New Room module v303 Package: src:hoteldruid; Maintainer for src:hoteldruid is Marco Maria Francesco De Santis <marco@digitaldruidnet>; Reported by: Neil Williams <codehelp@debianorg> Date: Fri, 4 Mar 2022 ...

Exploits

Hotel Druid version 303 suffers from a remote code execution vulnerability ...

Github Repositories

Hotel Druid 3.0.3 Code Injection to Remote Code Execution

CVE-2022-22909 Description A Code Injection vulnerability has been found on the Hotel Druid v303 application, which an attacker could exploit to execute remote code on the server For a successful exploitation, an attacker should have the privilege to add a new room Vulnerability description The vulnerability occurs because room names are getting stored inside a file named /

Exploits for Hotel Druid 3.0.3 - Remote Code Execution (RCE) CVE-2022-22909

CVE-2022-22909 Hotel Druid 303 - Remote Code Execution (RCE) Exploit by kaal Exploits HotelDruidExploitpy This Exploit will create new room with our PHP payload as a room name Usage : $ /HotelDruidExploitpy -h $ /HotelDruidExploitpy -u 127001/hoteldruid HotelDruidExploitRoompy This Exploit will work if you already know the Room name Usage : $ /Hote

Exploits for Hotel Druid 3.0.3 - Remote Code Execution (RCE) CVE-2022-22909

CVE-2022-22909 Hotel Druid 303 - Remote Code Execution (RCE) Exploit by kaal Exploits HotelDruidExploitpy This Exploit will create new room with our PHP payload as a room name Usage : $ /HotelDruidExploitpy -h $ /HotelDruidExploitpy -u 127001/hoteldruid HotelDruidExploitRoompy This Exploit will work if you already know the Room name Usage : $ /Hote

TryHackMe HotelKiosk Official Writeup I created the HotelKiosk box on TryHackMe to highlight my first two CVEs (CVE-2021-42949 and CVE-2021-42948) found from inspiration through TheMayor's blog post I Was Bored One NIght and Found Two CVEs I also drew inspiration from John Hammond's Kiosk Breakout YouTube series where he covers the setup and escape of Windows native