CVE-2024-0504: CWE-79 Cross Site Scripting in code-projects Simple Online Hotel Reservation System
A vulnerability has been found in code-projects Simple Online Hotel Reservation System 1.0 and classified as problematic. This vulnerability affects unknown code of the file add_reserve.php of the component Make a Reservation Page. The manipulation of the argument Firstname/Lastname with the input <script>alert(1)</script> leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-250618 is the identifier assigned to this vulnerability.
AI Analysis
Technical Summary
CVE-2024-0504 is a cross-site scripting (XSS) vulnerability identified in version 1.0 of the Simple Online Hotel Reservation System developed by code-projects. The vulnerability resides in the add_reserve.php file, specifically within the 'Make a Reservation' page component. It occurs due to insufficient input sanitization or output encoding of the 'Firstname' and 'Lastname' parameters, which allows an attacker to inject malicious JavaScript code, such as <script>alert(1)</script>. When a victim views the affected page with the injected script, the malicious code executes in their browser context. This vulnerability is classified under CWE-79, indicating a classic reflected or stored XSS flaw. The attack vector is remote, requiring no physical access, but it does require user interaction (the victim must load the maliciously crafted page). The CVSS v3.1 base score is 3.5 (low severity), reflecting that the impact is limited to integrity (potentially executing scripts) without direct compromise of confidentiality or availability. No known exploits in the wild have been reported yet, and no official patches have been linked. Given the nature of the vulnerability, it could be exploited to perform session hijacking, defacement, or phishing attacks by injecting malicious scripts that run in the context of the vulnerable web application. The vulnerability affects only version 1.0 of this specific hotel reservation system, which is a niche product likely used by small to medium hospitality businesses. The vulnerability disclosure date is January 13, 2024.
Potential Impact
For European organizations, particularly small and medium-sized hotels or hospitality businesses using the Simple Online Hotel Reservation System version 1.0, this vulnerability poses a risk of client-side script injection. Successful exploitation could lead to session hijacking, theft of user credentials, or redirection to malicious sites, undermining customer trust and potentially leading to reputational damage. While the direct impact on confidentiality and availability is low, the integrity of user interactions and data could be compromised. Additionally, attackers could leverage this vulnerability as a foothold for more complex social engineering or phishing campaigns targeting customers. Given the hospitality sector's importance in Europe, especially in countries with significant tourism industries, exploitation could disrupt customer experience and lead to regulatory scrutiny under GDPR if personal data is compromised through secondary attacks. However, the limited scope (only one product version) and low CVSS score suggest the overall risk is contained if organizations maintain good security hygiene and monitor for suspicious activity.
Mitigation Recommendations
To mitigate this vulnerability effectively, European organizations using the affected system should: 1) Immediately implement input validation and output encoding on the 'Firstname' and 'Lastname' fields in the add_reserve.php script to neutralize any injected scripts. This can be done by using established libraries or frameworks that automatically escape HTML special characters. 2) If possible, upgrade to a newer, patched version of the software once available or apply vendor-provided patches. 3) Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in the browser context, limiting the impact of any injected code. 4) Conduct regular security audits and penetration testing focusing on input fields to detect similar injection flaws. 5) Educate staff and users about the risks of clicking suspicious links or submitting unexpected inputs. 6) Monitor web server logs and application behavior for unusual requests or error patterns that may indicate attempted exploitation. 7) Consider deploying Web Application Firewalls (WAFs) with rules to detect and block common XSS attack payloads targeting the reservation system. These measures go beyond generic advice by focusing on specific code-level fixes, layered defenses, and operational monitoring tailored to this vulnerability.
Affected Countries
Germany, France, Italy, Spain, United Kingdom, Netherlands, Austria, Switzerland
CVE-2024-0504: CWE-79 Cross Site Scripting in code-projects Simple Online Hotel Reservation System
Description
A vulnerability has been found in code-projects Simple Online Hotel Reservation System 1.0 and classified as problematic. This vulnerability affects unknown code of the file add_reserve.php of the component Make a Reservation Page. The manipulation of the argument Firstname/Lastname with the input <script>alert(1)</script> leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-250618 is the identifier assigned to this vulnerability.
AI-Powered Analysis
Technical Analysis
CVE-2024-0504 is a cross-site scripting (XSS) vulnerability identified in version 1.0 of the Simple Online Hotel Reservation System developed by code-projects. The vulnerability resides in the add_reserve.php file, specifically within the 'Make a Reservation' page component. It occurs due to insufficient input sanitization or output encoding of the 'Firstname' and 'Lastname' parameters, which allows an attacker to inject malicious JavaScript code, such as <script>alert(1)</script>. When a victim views the affected page with the injected script, the malicious code executes in their browser context. This vulnerability is classified under CWE-79, indicating a classic reflected or stored XSS flaw. The attack vector is remote, requiring no physical access, but it does require user interaction (the victim must load the maliciously crafted page). The CVSS v3.1 base score is 3.5 (low severity), reflecting that the impact is limited to integrity (potentially executing scripts) without direct compromise of confidentiality or availability. No known exploits in the wild have been reported yet, and no official patches have been linked. Given the nature of the vulnerability, it could be exploited to perform session hijacking, defacement, or phishing attacks by injecting malicious scripts that run in the context of the vulnerable web application. The vulnerability affects only version 1.0 of this specific hotel reservation system, which is a niche product likely used by small to medium hospitality businesses. The vulnerability disclosure date is January 13, 2024.
Potential Impact
For European organizations, particularly small and medium-sized hotels or hospitality businesses using the Simple Online Hotel Reservation System version 1.0, this vulnerability poses a risk of client-side script injection. Successful exploitation could lead to session hijacking, theft of user credentials, or redirection to malicious sites, undermining customer trust and potentially leading to reputational damage. While the direct impact on confidentiality and availability is low, the integrity of user interactions and data could be compromised. Additionally, attackers could leverage this vulnerability as a foothold for more complex social engineering or phishing campaigns targeting customers. Given the hospitality sector's importance in Europe, especially in countries with significant tourism industries, exploitation could disrupt customer experience and lead to regulatory scrutiny under GDPR if personal data is compromised through secondary attacks. However, the limited scope (only one product version) and low CVSS score suggest the overall risk is contained if organizations maintain good security hygiene and monitor for suspicious activity.
Mitigation Recommendations
To mitigate this vulnerability effectively, European organizations using the affected system should: 1) Immediately implement input validation and output encoding on the 'Firstname' and 'Lastname' fields in the add_reserve.php script to neutralize any injected scripts. This can be done by using established libraries or frameworks that automatically escape HTML special characters. 2) If possible, upgrade to a newer, patched version of the software once available or apply vendor-provided patches. 3) Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in the browser context, limiting the impact of any injected code. 4) Conduct regular security audits and penetration testing focusing on input fields to detect similar injection flaws. 5) Educate staff and users about the risks of clicking suspicious links or submitting unexpected inputs. 6) Monitor web server logs and application behavior for unusual requests or error patterns that may indicate attempted exploitation. 7) Consider deploying Web Application Firewalls (WAFs) with rules to detect and block common XSS attack payloads targeting the reservation system. These measures go beyond generic advice by focusing on specific code-level fixes, layered defenses, and operational monitoring tailored to this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2024-01-12T14:14:55.330Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 683f034b182aa0cae27e66a8
Added to database: 6/3/2025, 2:14:35 PM
Last enriched: 7/4/2025, 2:55:59 PM
Last updated: 7/30/2025, 8:18:17 AM
Views: 12
Related Threats
CVE-2025-8845: Stack-based Buffer Overflow in NASM Netwide Assember
MediumCVE-2025-8844: NULL Pointer Dereference in NASM Netwide Assember
MediumCVE-2025-8843: Heap-based Buffer Overflow in NASM Netwide Assember
MediumCVE-2025-8842: Use After Free in NASM Netwide Assember
MediumCVE-2025-8841: Unrestricted Upload in zlt2000 microservices-platform
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.