CVE-2021-37832

9.8 CRITICAL

📋 TL;DR

CVE-2021-37832 is a critical SQL injection vulnerability in Hotel Druid 3.0.2 when using SQLite database. Attackers can execute arbitrary SQL commands through the idappartamenti parameter, potentially compromising the entire database. This affects all Hotel Druid 3.0.2 installations using SQLite.

💻 Affected Systems

Products:
  • Hotel Druid
Versions: 3.0.2
Operating Systems: All platforms running Hotel Druid
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects installations using SQLite database backend. MySQL installations are not vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including data theft, data manipulation, privilege escalation, and potential remote code execution via SQLite functions.

🟠

Likely Case

Unauthorized data access, data modification, and potential extraction of sensitive hotel guest information and business data.

🟢

If Mitigated

Limited impact with proper input validation and database permissions, potentially only error messages or limited data exposure.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public exploit code available on GitHub. SQL injection is straightforward through the idappartamenti parameter.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.0.3 or later

Vendor Advisory: https://www.hoteldruid.com

Restart Required: Yes

Instructions:

1. Download latest version from hoteldruid.com. 2. Backup current installation and database. 3. Install new version following vendor instructions. 4. Restart application services.

🔧 Temporary Workarounds

Input Validation Filter

all

Add input validation to sanitize idappartamenti parameter before processing

Implement parameterized queries or input validation in affected code

Web Application Firewall

all

Deploy WAF with SQL injection protection rules

Configure WAF to block SQL injection patterns in requests

🧯 If You Can't Patch

  • Isolate Hotel Druid system from internet and restrict network access
  • Implement strict input validation and parameterized queries in application code

🔍 How to Verify

Check if Vulnerable:

Check if running Hotel Druid 3.0.2 with SQLite database and test idappartamenti parameter for SQL injection

Check Version:

Check Hotel Druid admin interface or configuration files for version information

Verify Fix Applied:

Verify version is 3.0.3 or later and test idappartamenti parameter no longer accepts SQL injection

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in application logs
  • Error messages containing SQL syntax
  • Multiple failed login attempts or parameter manipulation

Network Indicators:

  • SQL keywords in HTTP parameters
  • Unusual database connection patterns
  • Excessive requests to idappartamenti endpoint

SIEM Query:

source="hoteldruid.log" AND ("SQL" OR "syntax" OR "idappartamenti")

🔗 References

📤 Share & Export