S4E

CVE-2019-15774 Scanner

CVE-2019-15774 Scanner - Unauthenticated Options Change vulnerability in ND Booking

Short Info


Level

Medium

Single Scan

Single Scan

Can be used by

Asset Owner

Estimated Time

10 seconds

Time Interval

23 days 5 hours

Scan only one

Domain, Subdomain, IPv4

Toolbox

-

The ND Booking plugin is utilized by hotel booking websites using WordPress to manage and facilitate room bookings and reservations. This plugin is favored among small to medium-sized hotels for its ease of use in setting up customizable booking options directly through a WordPress dashboard. Many hotels employ ND Booking to streamline their online reservation processes, ultimately enhancing guest experiences by providing efficient booking management. The software is often maintained by IT personnel or website administrators responsible for ensuring the functionality and security of hotel websites. Given its user-friendly interface, it allows for swift updates and changes according to hotel needs and promotional offers.

The Unauthenticated Options Change vulnerability identified in ND Booking enables unauthorized users to alter plugin settings without authentication. This type of vulnerability typically arises from insufficient access controls on sensitive plugin operations. It can be particularly concerning given that changes to configuration options can potentially disable security features or modify booking-related data inadvertently or maliciously. Such vulnerabilities are exploited by attackers aiming to bypass administrative restrictions to gain control over critical configurations. The vulnerability is categorized under medium severity due to its potential impact, despite requiring no prior authentication from attackers.

This vulnerability occurs at the endpoint running the specific AJAX action related to 'nd_booking_import_settings_php_function'. The security issue arises because this endpoint fails to adequately check for authentication when requests are sent to modify plugin settings. Attackers can easily craft HTTP requests targeting this AJAX action, thereby changing options like 'nd_booking_plugin_dev_mode' without proper access rights. The vulnerability primarily affects ND Booking versions below 2.5, where such access control flaws were unintentionally introduced or overlooked.

If exploited, this vulnerability could lead malicious actors to make unauthorized changes to key booking settings. Such actions could result in incorrect or harmful operating modes being applied, potentially disrupting bookings or leading to financial and reputational damage for hotels. Website security could be compromised, exposing sensitive booking data or altering system behavior to the detriment of hotel operations. Malicious intrusions might go unnoticed, given that unauthorized changes could mimic legitimate administrative modifications, leading to undetected prolonged periods of vulnerability in hotel booking operations.

REFERENCES

Get started to protecting your digital assets