Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-42558: n/a

0
Critical
VulnerabilityCVE-2024-42558cvecve-2024-42558
Published: Tue Aug 20 2024 (08/20/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

Hotel Management System commit 91caab8 was discovered to contain a SQL injection vulnerability via the book_id parameter at admin_modify_room.php.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 05:58:44 UTC

Technical Analysis

CVE-2024-42558 is a critical SQL injection vulnerability identified in a Hotel Management System, specifically in the admin_modify_room.php file through the book_id parameter. This vulnerability allows an unauthenticated attacker to inject malicious SQL code remotely, potentially leading to unauthorized data access, data manipulation, or complete system compromise. The vulnerability is classified under CWE-89, which corresponds to improper neutralization of special elements used in SQL commands. The CVSS v3.1 base score of 9.8 reflects the vulnerability's high severity, with attack vector being network-based (AV:N), no required privileges (PR:N), no user interaction (UI:N), and impacts on confidentiality, integrity, and availability all rated high (C:H/I:H/A:H). Although no known exploits have been reported in the wild yet, the vulnerability's characteristics make it highly exploitable. The lack of specified affected versions suggests the flaw may be present in multiple or all versions of the system prior to remediation. The vulnerability arises from insufficient input validation or sanitization of the book_id parameter, allowing attackers to manipulate SQL queries executed by the backend database. This can lead to unauthorized data disclosure, modification, deletion, or even full control over the underlying database and application server. Given the critical nature of the flaw and the sensitive data handled by hotel management systems, this vulnerability poses a significant risk to confidentiality and operational continuity.

Potential Impact

The impact of CVE-2024-42558 on organizations worldwide is severe. Exploitation can lead to unauthorized access to sensitive customer data, including personal and payment information, which can result in privacy violations and regulatory penalties. Attackers could alter booking records, disrupt hotel operations, or delete critical data, causing significant business disruption and reputational damage. The vulnerability's ability to compromise confidentiality, integrity, and availability simultaneously makes it a prime target for attackers aiming to conduct data theft, fraud, or ransomware deployment. Hospitality organizations relying on the affected system may face operational downtime, financial losses, and erosion of customer trust. Additionally, the vulnerability could be leveraged as a pivot point for further network compromise within an organization's infrastructure. Given the global nature of the hospitality industry, the threat extends across multiple regions, potentially affecting international hotel chains and their customers.

Mitigation Recommendations

To mitigate CVE-2024-42558, organizations should immediately implement the following measures: 1) Apply any available patches or updates from the vendor; if none are available, consider temporary workarounds such as disabling the vulnerable functionality or restricting access to the admin_modify_room.php script via network controls. 2) Implement strict input validation and sanitization on the book_id parameter to ensure only expected numeric or alphanumeric values are accepted. 3) Use parameterized queries or prepared statements in the application code to prevent SQL injection. 4) Restrict database user permissions to the minimum necessary, avoiding use of high-privilege accounts for web application database connections. 5) Employ web application firewalls (WAFs) with rules designed to detect and block SQL injection attempts targeting this parameter. 6) Conduct thorough code reviews and security testing of the application to identify and remediate similar injection flaws. 7) Monitor logs for suspicious activity related to the vulnerable endpoint and prepare incident response plans in case of exploitation. 8) Educate development teams on secure coding practices to prevent recurrence of injection vulnerabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-08-05T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6cc2b7ef31ef0b568dae

Added to database: 2/25/2026, 9:42:26 PM

Last enriched: 2/28/2026, 5:58:44 AM

Last updated: 4/12/2026, 10:31:36 AM

Views: 13

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses