• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
restaurant reservation system patches easy to exploit xss bug

Restaurant Reservation System Patches Easy-to-Exploit XSS Bug

You are here: Home / Latest Cyber Security Vulnerabilities / Restaurant Reservation System Patches Easy-to-Exploit XSS Bug
May 24, 2021

A WordPress reservation plugin has a vulnerability that enables unauthenticated hackers to accessibility reservation info stored by web site homeowners.

An quick-to-exploit bug impacting the WordPress plugin ReDi Cafe Reservation enables unauthenticated attackers to pilfer reservation details and customer personalized identifiable details by merely submitting a destructive snippet of JavaScript code into the reservation remark area.

The bug has an effect on ReDi Restaurant Reservation versions prior to 21.0307, with a patched (v. 21.0426) variation of the plugin readily available for obtain. The vulnerability (CVE-2021-24299) is a persistent cross-web site scripting (XSS) bug. The flaw is not however rated.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


A community evidence-of-idea disclosure of the ReDi bug was unveiled Sunday with the official community disclosure delayed a thirty day period “due to the severity of the vulnerability,” in accordance to Bastijn Ouwendijk, credited for discovering the bug. The researcher alerted the makers of the plugin, Catz Smooth, on April 15. A correct was accessible on April 25.“[The bug] makes it feasible for destructive attackers to, for illustration, steal the plugin API-vital and perhaps steal data about consumers that created reservations, steal cookies or other delicate facts,” in accordance Ouwendijk in a complex breakdown and proof of concept of the bug posted Sunday.

Leaky application programming interface (API) keys have been a preferred goal of hackers in dozens of attacks and been responsible for even additional vendor fixes. Twitter, Imperva’s Cloud Web Software Firewall and not long ago 30 well-known mHealth apps have every grappled with insecure API vital issues.

Very easily Exploit Bug

A critique of the ReDi Restaurant Reservation plugin bug displays how an adversary can launch an attack simply by employing a JavaScript payload – one that has less than 250 figures – to exploit the XSS bug.

Technical Write-up on CVE-2021-24299“How does this vulnerability operate? The plugin offers customers the features to ebook a reservation for the restaurant. A consumer just has to check out the reservation website page,” the researcher discussed. Subsequent, the attacker tends to make a reservation and in the “Comment” area inputs the malicious JavaScript. Since the text and JavaScript code is not sanitized, or rendered harmless, the user remark details “is processed and saved to neighborhood variables.”

“Next, the saved variables are pushed to the databases. Also observe right here that variables are not sanitized or validated ahead of remaining pushed to the database. This signifies the strings we post by means of the variety for the variables UserName, UserPhone, UserEmail and UserComments will be saved to the database without adjustments,” the researcher wrote.

The payload is executed when a WordPress web page administrator or cafe operator sights the reservations through the platform’s have webpage.

“This is a webpage exactly where you can check out the reservations designed for a particular time period of time. This site isn’t a WordPress webpage, but an external webpage that is loaded within just an iframe, as can be witnessed in the PHP code,” the researcher stated.

PHP (Hypertext Preprocessor) is scripting language applied for generating dynamic articles executed on a web server.

“The url that is loaded inside of the iframe normally takes the url https[://]future.reservationdiary[.]eu/Entry/ and appends it with the API-essential that is registered in your ReDi Cafe Reservation plugin. When checking out this url, it exhibits all the designed reservations for a specific time period of time,” Ouwendijk wrote.

The publishers of the plugin, Catz Comfortable, did not reply to requests for reviews. The researcher, Ouwendijk, did not reply to precise technical inquiries pertaining to this bug.

Be a part of Threatpost for “A Stroll On The Dark Facet: A Pipeline Cyber Crisis Simulation”– a Reside interactive demo on Wed, June 9 at 2:00 PM EDT. Sponsored by Immersive Labs, obtain out whether or not you have the resources and abilities to prevent a Colonial Pipeline-style attack on your business. Queries and Stay viewers participation inspired. Be a part of the dialogue and Register HERE for totally free.


Some elements of this article are sourced from:
threatpost.com

Previous Post: «microsoft exchange admin portal taken offline due to forgotten certificate Microsoft Exchange admin portal taken offline due to forgotten certificate
Next Post: EY and CrowdStrike partner to deliver cloud-based security services ey and crowdstrike partner to deliver cloud based security services»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.