HotelDruid Hotel Management Software v3.0.3 and below was discovered to have exposed session tokens in multiple links via GET parameters, allowing attackers to access user session id's.
The product transmits sensitive or security-critical data in cleartext in a communication channel that can be sniffed by unauthorized actors.
Link | Tags |
---|---|
https://www.hoteldruid.com/ | product vendor advisory |
https://github.com/dhammon/Security | broken link |
https://github.com/dhammon/HotelDruid-CVE-2021-42948 | third party advisory |