Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-44203

Опубликовано: 20 июн. 2025
Источник: debian
EPSS Низкий

Описание

In HotelDruid 3.0.7, an unauthenticated attacker can exploit verbose SQL error messages on creadb.php before the 'create database' button is pressed. By sending malformed POST requests to this endpoint, the attacker may obtain the administrator username, password hash, and salt. In some cases, the attack results in a Denial of Service (DoS), preventing the administrator from logging in even with the correct credentials.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
hoteldruidfixed3.0.8-1package
hoteldruidno-dsabookwormpackage
hoteldruidno-dsabullseyepackage

Примечания

  • https://github.com/IvanT7D3/CVE-2025-44203

EPSS

Процентиль: 9%
0.00033
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
8 месяцев назад

In HotelDruid 3.0.7, an unauthenticated attacker can exploit verbose SQL error messages on creadb.php before the 'create database' button is pressed. By sending malformed POST requests to this endpoint, the attacker may obtain the administrator username, password hash, and salt. In some cases, the attack results in a Denial of Service (DoS), preventing the administrator from logging in even with the correct credentials.

CVSS3: 7.5
nvd
8 месяцев назад

In HotelDruid 3.0.7, an unauthenticated attacker can exploit verbose SQL error messages on creadb.php before the 'create database' button is pressed. By sending malformed POST requests to this endpoint, the attacker may obtain the administrator username, password hash, and salt. In some cases, the attack results in a Denial of Service (DoS), preventing the administrator from logging in even with the correct credentials.

CVSS3: 7.5
github
8 месяцев назад

In HotelDruid 3.0.7, an unauthenticated attacker can exploit verbose SQL error messages on creadb.php before the 'create database' button is pressed. By sending malformed POST requests to this endpoint, the attacker may obtain the administrator username, password hash, and salt. In some cases, the attack results in a Denial of Service (DoS), preventing the administrator from logging in even with the correct credentials.

EPSS

Процентиль: 9%
0.00033
Низкий