Resortdata

Internet Reservation Module Next Generation

5 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.3%
  • Veröffentlicht 07.09.2023 13:15:08
  • Zuletzt bearbeitet 21.11.2024 08:15:23

The RDPCore.dll component as used in the IRM Next Generation booking engine, allows a remote user to connect to customers with an "admin" account and a corresponding password computed daily by a routine inside the DLL file. Once reverse-engineered, t...

  • EPSS 0.06%
  • Veröffentlicht 07.09.2023 13:15:08
  • Zuletzt bearbeitet 21.11.2024 08:15:23

The RDPWin.dll component as used in the IRM Next Generation booking engine includes a set of hardcoded API keys for third-party services such as Twilio and Vonage. These keys allow unrestricted interaction with these services.

  • EPSS 0.07%
  • Veröffentlicht 07.09.2023 13:15:08
  • Zuletzt bearbeitet 21.11.2024 08:15:23

The /irmdata/api/ endpoints exposed by the IRM Next Generation booking engine authenticates requests using HMAC tokens. These tokens are however exposed in a JavaScript file loaded on the client side, thus rendering this extra safety mechanism useles...

  • EPSS 0.08%
  • Veröffentlicht 07.09.2023 13:15:08
  • Zuletzt bearbeitet 21.11.2024 08:15:23

The RDPData.dll file exposes the /irmdata/api/common endpoint that handles session IDs,  among other features. By using a UNION SQL operator, an attacker can leak the sessions table, obtain the currently valid sessions and impersonate a currently log...

  • EPSS 0.41%
  • Veröffentlicht 07.09.2023 13:15:08
  • Zuletzt bearbeitet 21.11.2024 08:15:24

A vulnerability in RDPngFileUpload.dll, as used in the IRM Next Generation booking system, allows a remote attacker to upload arbitrary content (such as a web shell component) to the SQL database and execute it with SYSTEM privileges. This vulnerabil...