• Bug#1101015: hoteldruid: CVE-2025-25747 CVE-2025-25748 CVE-2025-25749

    From Salvatore Bonaccorso@21:1/5 to All on Fri Mar 21 20:40:01 2025
    Source: hoteldruid
    Version: 3.0.6-1
    Severity: grave
    Tags: security upstream
    X-Debbugs-Cc: carnil@debian.org, Debian Security Team <team@security.debian.org>

    Hi,

    The following vulnerabilities were published for hoteldruid.

    CVE-2025-25747[0]:
    | Cross Site Scripting vulnerability in DigitalDruid HotelDruid
    | v.3.0.7 allows an attacker to execute arbitrary code and obtain
    | sensitive information via the ripristina_backup parameter in the
    | crea_backup.php endpoint


    CVE-2025-25748[1]:
    | A CSRF vulnerability in the gestione_utenti.php endpoint of
    | HotelDruid 3.0.7 allows attackers to perform unauthorized actions
    | (e.g., modifying user passwords) on behalf of authenticated users by
    | exploiting the lack of origin or referrer validation and the absence
    | of CSRF tokens. NOTE: this is disputed because there is an
    | id_sessione CSRF token.


    CVE-2025-25749[2]:
    | An issue in HotelDruid version 3.0.7 and earlier allows users to set
    | weak passwords due to the lack of enforcement of password strength
    | policies.


    If you fix the vulnerabilities please also make sure to include the
    CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

    For further information see:

    [0] https://security-tracker.debian.org/tracker/CVE-2025-25747
    https://www.cve.org/CVERecord?id=CVE-2025-25747
    [1] https://security-tracker.debian.org/tracker/CVE-2025-25748
    https://www.cve.org/CVERecord?id=CVE-2025-25748
    [2] https://security-tracker.debian.org/tracker/CVE-2025-25749
    https://www.cve.org/CVERecord?id=CVE-2025-25749

    Please adjust the affected versions in the BTS as needed.

    Regards,
    Salvatore

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)