The /irmdata/api/ endpoints exposed by the IRM Next Generation booking engine authenticates requests using HMAC tokens. These tokens are however exposed in a JavaScript file loaded on the client side, thus rendering this extra safety mechanism useless.
References
Link | Resource |
---|---|
https://bitdefender.com/blog/labs/check-out-with-extra-charges-vulnerabilities-in-hotel-booking-engine-explained | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: Bitdefender
Published: 2023-09-07T12:22:52.239Z
Updated: 2023-09-07T12:22:52.239Z
Reserved: 2023-08-01T15:26:26.149Z
Link: CVE-2023-39422
JSON object: View
NVD Information
Status : Analyzed
Published: 2023-09-07T13:15:08.710
Modified: 2023-09-12T00:08:38.390
Link: CVE-2023-39422
JSON object: View
Redhat Information
No data.
CWE