CVE-2024-42773

9.1 CRITICAL

📋 TL;DR

An unauthenticated attacker can edit hotel room entries in the administrator section of Kashipara Hotel Management System v1.0 due to incorrect access control. This affects all deployments of this software version that expose the vulnerable endpoint. Attackers can modify room data without any authentication.

💻 Affected Systems

Products:
  • Kashipara Hotel Management System
Versions: v1.0
Operating Systems: Any OS running PHP web server
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all installations with the vulnerable /admin/edit_room_controller.php endpoint accessible.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of hotel room management data, allowing room availability manipulation, pricing changes, or denial of service by deleting/modifying all room entries.

🟠

Likely Case

Unauthorized modification of room details, pricing, availability status, or descriptions leading to operational disruption and potential financial loss.

🟢

If Mitigated

Limited impact if proper authentication and authorization checks are implemented, restricting access to authorized administrators only.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Direct HTTP request to vulnerable endpoint with room parameters can modify data. No authentication required.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://www.kashipara.com/

Restart Required: No

Instructions:

No official patch available. Contact vendor for updated version or implement workarounds.

🔧 Temporary Workarounds

Restrict access to admin directory

all

Block unauthenticated access to /admin/ directory using web server configuration

# Apache: Add to .htaccess in admin directory
Order Deny,Allow
Deny from all
Allow from 127.0.0.1
# Or use IP whitelisting for admin IPs

Implement authentication check

all

Add session validation at beginning of edit_room_controller.php

<?php
session_start();
if(!isset($_SESSION['admin_logged_in']) || $_SESSION['admin_logged_in'] !== true) {
    header('HTTP/1.0 403 Forbidden');
    die('Access denied');
}
?>

🧯 If You Can't Patch

  • Remove or rename edit_room_controller.php file if functionality not required
  • Implement web application firewall (WAF) rules to block requests to vulnerable endpoint from unauthorized IPs

🔍 How to Verify

Check if Vulnerable:

Send HTTP POST request to /admin/edit_room_controller.php with room parameters without authentication. If request succeeds, system is vulnerable.

Check Version:

Check software version in admin panel or readme files. Look for 'v1.0' in source code or documentation.

Verify Fix Applied:

Attempt same unauthenticated request after implementing fixes. Should receive 403 Forbidden or redirect to login.

📡 Detection & Monitoring

Log Indicators:

  • HTTP 200 responses to POST /admin/edit_room_controller.php from unauthenticated IPs
  • Unusual room data modifications in database logs

Network Indicators:

  • POST requests to /admin/edit_room_controller.php without preceding login requests
  • Room parameter modifications from unexpected source IPs

SIEM Query:

source="web_server_logs" AND (uri_path="/admin/edit_room_controller.php" AND http_method="POST") AND NOT (src_ip IN admin_ip_whitelist)

🔗 References

📤 Share & Export