{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-13T21:56:08.062","vulnerabilities":[{"cve":{"id":"CVE-2023-39420","sourceIdentifier":"cve-requests@bitdefender.com","published":"2023-09-07T13:15:08.517","lastModified":"2024-11-21T08:15:23.430","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The RDPCore.dll component as used in the IRM Next Generation booking engine, allows a remote user to connect to customers with an \"admin\" account and a corresponding password computed daily by a routine inside the DLL file. Once reverse-engineered, this routine can help an attacker generate the daily password and connect to application customers. Given that this is an administrative account, anyone logging into a customer deployment has full, unrestricted access to the application."},{"lang":"es","value":"El componente RDPCore.dll tal como se usa en el motor de booking de IRM Next Generation, permite a un usuario remoto conectarse a los clientes con una cuenta \"admin\" y una contraseña correspondiente calculada diariamente por una rutina dentro del archivo DLL. Una vez realizada la ingeniería inversa, esta rutina puede ayudar a un atacante a generar la contraseña diaria y conectarse con los clientes de la aplicación. Dado que se trata de una cuenta administrativa, cualquier persona que inicie sesión en un deploy de cliente tiene acceso completo y sin restricciones a la aplicación."}],"metrics":{"cvssMetricV31":[{"source":"cve-requests@bitdefender.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H","baseScore":9.9,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.1,"impactScore":6.0},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}]},"weaknesses":[{"source":"cve-requests@bitdefender.com","type":"Secondary","description":[{"lang":"en","value":"CWE-798"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:resortdata:internet_reservation_module_next_generation:5.3.2.15:*:*:*:*:*:*:*","matchCriteriaId":"D9D4E8D4-6E26-4EEE-BFB6-FA4BB522808C"}]}]}],"references":[{"url":"https://bitdefender.com/blog/labs/check-out-with-extra-charges-vulnerabilities-in-hotel-booking-engine-explained/","source":"cve-requests@bitdefender.com","tags":["Third Party Advisory"]},{"url":"https://bitdefender.com/blog/labs/check-out-with-extra-charges-vulnerabilities-in-hotel-booking-engine-explained/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}