vendor:
NetHoteles v2.0
by:
Dns-Team
8,8
CVSS
HIGH
Authentication Bypass
287
CWE
Product Name: NetHoteles v2.0
Affected Version From: 2.0
Affected Version To: 2.0
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2020
NetHoteles v2.0 (Auth Bypass) Remote Sql Injection
NetHoteles v2.0 is vulnerable to authentication bypass due to improper input validation. An attacker can exploit this vulnerability by providing malicious input in the username and password fields. This will allow the attacker to bypass authentication and gain access to the application. The attacker can then use the application to perform malicious activities such as data exfiltration, privilege escalation, etc.
Mitigation:
Input validation should be implemented to ensure that only valid input is accepted. Additionally, authentication should be enforced for all users and access to sensitive data should be restricted.