CVE-2023-39420

The RDPCore.dll component as used in the IRM Next Generation booking engine, allows a remote user to connect to customers with an "admin" account and a corresponding password computed daily by a routine inside the DLL file. Once reverse-engineered, this routine can help an attacker generate the daily password and connect to application customers. Given that this is an administrative account, anyone logging into a customer deployment has full, unrestricted access to the application.
Configurations

Configuration 1 (hide)

cpe:2.3:a:resortdata:internet_reservation_module_next_generation:5.3.2.15:*:*:*:*:*:*:*

History

12 Sep 2023, 14:11

Type Values Removed Values Added
CPE cpe:2.3:a:resortdata:internet_reservation_module_next_generation:5.3.2.15:*:*:*:*:*:*:*
First Time Resortdata internet Reservation Module Next Generation
Resortdata
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.8
References (MISC) https://bitdefender.com/blog/labs/check-out-with-extra-charges-vulnerabilities-in-hotel-booking-engine-explained/ - (MISC) https://bitdefender.com/blog/labs/check-out-with-extra-charges-vulnerabilities-in-hotel-booking-engine-explained/ - Third Party Advisory

07 Sep 2023, 13:42

Type Values Removed Values Added
New CVE

Information

Published : 2023-09-07 13:15

Updated : 2023-12-10 15:14


NVD link : CVE-2023-39420

Mitre link : CVE-2023-39420

CVE.ORG link : CVE-2023-39420


JSON object : View

Products Affected

resortdata

  • internet_reservation_module_next_generation
CWE
CWE-798

Use of Hard-coded Credentials