CVE-2024-10413

6.3 MEDIUM

📋 TL;DR

This critical vulnerability in SourceCodester Online Hotel Reservation System 1.0 allows attackers to upload arbitrary files without restrictions via the /guest/update.php endpoint. This can lead to remote code execution, data theft, or complete system compromise. Any organization using this specific hotel reservation system version is affected.

💻 Affected Systems

Products:
  • SourceCodester Online Hotel Reservation System
Versions: 1.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the default installation. No special configuration is required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system takeover through remote code execution, allowing attackers to steal sensitive data, install malware, or use the server as part of a botnet.

🟠

Likely Case

Attackers upload web shells to gain persistent access, deface websites, or exfiltrate hotel guest data including personal information and payment details.

🟢

If Mitigated

With proper file upload validation and web application firewalls, impact is limited to failed upload attempts or temporary service disruption.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit code is publicly available on GitHub, making this easily exploitable by attackers with minimal technical skill.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://www.sourcecodester.com/

Restart Required: No

Instructions:

No official patch available. Check vendor website for updates or consider alternative solutions.

🔧 Temporary Workarounds

Restrict File Uploads

all

Implement strict file upload validation including file type checking, size limits, and content verification

Disable Guest Update Function

all

Temporarily disable or restrict access to /guest/update.php endpoint

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block malicious file upload patterns
  • Isolate the vulnerable system from critical networks and implement strict network segmentation

🔍 How to Verify

Check if Vulnerable:

Attempt to upload a file with malicious extension (e.g., .php, .jsp) to /guest/update.php endpoint and check if it's accepted

Check Version:

Check system documentation or admin panel for version information

Verify Fix Applied:

Test file upload functionality with various file types to ensure only allowed extensions are accepted

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads to /guest/update.php
  • Uploads of executable file types (.php, .jsp, .asp)
  • Multiple failed upload attempts

Network Indicators:

  • POST requests to /guest/update.php with file uploads
  • Traffic patterns indicating file upload exploitation

SIEM Query:

source="web_logs" AND uri="/guest/update.php" AND method="POST" AND (file_extension="php" OR file_extension="jsp" OR file_extension="asp")

🔗 References

📤 Share & Export