Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-42948 PoC — HotelDruid 安全漏洞

Source
Associated Vulnerability
Title:HotelDruid 安全漏洞 (CVE-2021-42948)
Description:HotelDruid是Digitaldruid.net团队的一套酒店管理系统。该系统包括客房管理、财务管理和库存管理等功能。 HotelDruid Hotel Management Software v3.0.3版本及之前版本存在安全漏洞,该漏洞源于通过GET参数在多个链接中暴露会话令牌。攻击者利用该漏洞访问用户会话id。
Readme

# CVE-2021-42948
HotelDruid Hotel Management Software v3.0.3 and below was discovered to have exposed session tokens in multiple links via GET parameters, allowing attackers to access user session id's.

The session token used to access authenticated pages of the application is passed using GET methods generated from the head.php file.  The head.php file creates the application's menu bar to navigate to various application functions.  Every link in the menu bar exposes the session token as the value for the parameter id_sessione.

The session token plaintext is exposed in GET requests which can be intercepted by attackers through proxies, man in the middle attacks, or similar and used to hijack application user sessions.

## Remediation
The vendor has decided not to pursue a patch to remediate this vulnerability.

## Product Reference
https://www.hoteldruid.com/

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42948
File Snapshot

[4.0K] /data/pocs/8cdd8f6ce27f8023b6a2a12972ce0eb8f210333f └── [ 939] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.