Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-42772: n/a

0
High
VulnerabilityCVE-2024-42772cvecve-2024-42772
Published: Thu Aug 22 2024 (08/22/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

An Incorrect Access Control vulnerability was found in /admin/rooms.php in Kashipara Hotel Management System v1.0, which allows an unauthenticated attacker to view valid hotel room entries in administrator section.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 06:14:04 UTC

Technical Analysis

CVE-2024-42772 identifies an Incorrect Access Control vulnerability in the Kashipara Hotel Management System version 1.0, located in the /admin/rooms.php endpoint. This vulnerability allows an unauthenticated attacker to bypass access controls and view valid hotel room entries that should be restricted to administrators. The root cause is a failure to enforce proper authentication and authorization checks on the administrative page, which exposes sensitive data about hotel room configurations. The vulnerability is classified under CWE-284 (Improper Access Control), indicating that the system does not adequately restrict access to privileged resources. The CVSS 3.1 base score of 7.5 reflects a high severity due to the complete lack of required privileges (PR:N), no user interaction (UI:N), and network attack vector (AV:N), combined with a high confidentiality impact (C:H) but no impact on integrity or availability. Although no patches or known exploits are currently documented, the vulnerability presents a significant risk as it allows attackers to gather sensitive information that could be leveraged for further attacks, such as targeted phishing or exploitation of other system components. The affected software is a hotel management system, which is often deployed in hospitality environments worldwide, potentially exposing sensitive operational data. The vulnerability's ease of exploitation and the sensitive nature of the data accessed make it a critical concern for organizations relying on this software.

Potential Impact

The primary impact of CVE-2024-42772 is the unauthorized disclosure of sensitive hotel room data from the administrative section of the Kashipara Hotel Management System. This breach of confidentiality can lead to several downstream risks, including aiding attackers in mapping hotel infrastructure, facilitating social engineering or phishing attacks against hotel staff or guests, and potentially exposing operational details that could be exploited for financial fraud or sabotage. Although the vulnerability does not affect data integrity or system availability directly, the exposure of administrative data undermines trust and could lead to reputational damage for affected organizations. Hotels and hospitality businesses using this system worldwide may face increased risk of targeted attacks, especially if attackers combine this information with other vulnerabilities or insider knowledge. The ease of exploitation without authentication increases the likelihood of automated scanning and exploitation attempts, potentially leading to widespread data leakage if not addressed promptly.

Mitigation Recommendations

To mitigate CVE-2024-42772, organizations should immediately restrict access to the /admin/rooms.php page by implementing strong authentication and authorization controls, ensuring that only verified administrators can access this resource. Network-level protections such as IP whitelisting or VPN requirements for administrative interfaces can further reduce exposure. Conduct a thorough code review and update the application to enforce proper access control checks on all administrative endpoints. If a patch from the vendor becomes available, apply it promptly. Additionally, implement monitoring and alerting for unusual access patterns to administrative pages, including repeated unauthenticated requests. Consider deploying web application firewalls (WAFs) with rules to detect and block unauthorized access attempts. Regularly audit user permissions and segregate administrative functions from publicly accessible components. Finally, educate staff about the risks of information disclosure and ensure incident response plans are prepared to handle potential exploitation scenarios.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-08-05T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6cccb7ef31ef0b569221

Added to database: 2/25/2026, 9:42:36 PM

Last enriched: 2/28/2026, 6:14:04 AM

Last updated: 4/12/2026, 7:52:57 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses