Lucene search

K
cvelistBitdefenderCVELIST:CVE-2023-39422
HistorySep 07, 2023 - 12:22 p.m.

CVE-2023-39422 Use of Hard-coded Credentials in multiple /irmdata/api/ endpoints

2023-09-0712:22:52
CWE-798
Bitdefender
www.cve.org
4
cve-2023-39422
hard-coded credentials
irm next generation
hmac tokens
javascript file

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N

AI Score

9.8

Confidence

High

EPSS

0.002

Percentile

54.1%

TheΒ /irmdata/api/ endpoints exposed by theΒ IRM Next Generation booking engine authenticates requests using HMAC tokens. These tokens are however exposed in a JavaScript file loaded on the client side, thus rendering this extra safety mechanism useless.

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "modules": [
      "/irmdata/api/"
    ],
    "product": "IRM Next Generation",
    "vendor": "Resort Data Processing, Inc.",
    "versions": [
      {
        "status": "unknown",
        "version": "5"
      }
    ]
  }
]

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N

AI Score

9.8

Confidence

High

EPSS

0.002

Percentile

54.1%

Related for CVELIST:CVE-2023-39422