Skip to main content

CVE-2021-39473: n/a in n/a

Medium
VulnerabilityCVE-2021-39473cvecve-2021-39473
Published: Fri Nov 04 2022 (11/04/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

Saibamen HotelManager v1.2 is vulnerable to Cross Site Scripting (XSS) due to improper sanitization of comment and contact fields.

AI-Powered Analysis

AILast updated: 06/26/2025, 03:14:00 UTC

Technical Analysis

CVE-2021-39473 is a medium-severity Cross Site Scripting (XSS) vulnerability affecting Saibamen HotelManager version 1.2. The vulnerability arises from improper sanitization of user-supplied input in the comment and contact fields within the application. Specifically, the application fails to adequately filter or encode malicious script content submitted through these fields, allowing an attacker to inject arbitrary JavaScript code. When a victim views the affected page, the malicious script executes in their browser context, potentially leading to session hijacking, credential theft, or unauthorized actions performed on behalf of the user. The CVSS 3.1 vector indicates that the attack can be performed remotely over the network (AV:N) with low attack complexity (AC:L), requiring the attacker to have some privileges (PR:L) and user interaction (UI:R). The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component. The impact on confidentiality and integrity is low (C:L, I:L), with no impact on availability (A:N). No known exploits are currently reported in the wild, and no patches or vendor advisories are available. The vulnerability is categorized under CWE-79, which is a common web application security weakness related to improper neutralization of input leading to XSS.

Potential Impact

For European organizations, especially those in the hospitality sector using Saibamen HotelManager v1.2, this vulnerability poses a risk of client-side attacks that can compromise user sessions and data confidentiality. Attackers could exploit this to steal sensitive customer information, such as personal details or booking data, or perform unauthorized actions within the application context. This could lead to reputational damage, regulatory non-compliance (e.g., GDPR violations due to data leakage), and potential financial losses. The requirement for some level of privilege and user interaction reduces the ease of exploitation but does not eliminate risk, particularly in environments where employees or customers frequently interact with the vulnerable fields. Since the vulnerability affects web-facing components, it could be leveraged in targeted phishing or social engineering campaigns. The lack of known exploits suggests limited current threat activity, but the presence of the vulnerability in a hospitality management system makes it a potential target for attackers seeking to disrupt services or harvest customer data.

Mitigation Recommendations

European organizations using Saibamen HotelManager v1.2 should implement the following specific mitigations: 1) Immediately review and sanitize all user inputs in comment and contact fields using robust server-side input validation and output encoding techniques to neutralize scripts. 2) Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. 3) Conduct a thorough code audit of the application to identify and remediate any other unsanitized input vectors. 4) Restrict privileges of users who can submit comments or contact information to minimize the risk of privilege escalation. 5) Implement multi-factor authentication (MFA) to reduce the impact of session hijacking. 6) Monitor web application logs for suspicious input patterns indicative of XSS attempts. 7) Educate staff and users about the risks of interacting with untrusted input and encourage cautious behavior regarding links and inputs. 8) If possible, isolate the HotelManager application within a segmented network zone to limit lateral movement in case of compromise. Since no official patch is available, these compensating controls are critical until an update or vendor fix is released.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2021-08-23T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9837c4522896dcbebae4

Added to database: 5/21/2025, 9:09:11 AM

Last enriched: 6/26/2025, 3:14:00 AM

Last updated: 8/2/2025, 8:46:28 PM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats