Debian Package Tracker
Register | Log in
Subscribe

hoteldruid

web-based property management system for hotels or B&Bs

Choose email to subscribe with

general
  • source: hoteldruid (main)
  • version: 3.0.6-1
  • maintainer: Marco Maria Francesco De Santis (DMD)
  • arch: all
  • std-ver: 4.6.2
  • VCS: unknown
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 2.3.2-1
  • oldstable: 3.0.1-1
  • stable: 3.0.4-1
  • unstable: 3.0.6-1
versioned links
  • 2.3.2-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 3.0.1-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 3.0.4-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 3.0.6-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • hoteldruid
action needed
A new upstream version is available: 3.0.7 high
A new upstream version 3.0.7 is available, you should consider packaging it.
Created: 2024-11-16 Last update: 2025-05-21 23:30
4 security issues in sid high

There are 4 open security issues in sid.

4 important issues:
  • CVE-2023-43378: A cross-site scripting (XSS) vulnerability in Hoteldruid v3.0.5 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the commento1_1 parameter.
  • CVE-2025-25747: Cross Site Scripting vulnerability in DigitalDruid HotelDruid v.3.0.7 allows an attacker to execute arbitrary code and obtain sensitive information via the ripristina_backup parameter in the crea_backup.php endpoint
  • CVE-2025-25748: A CSRF vulnerability in the gestione_utenti.php endpoint of HotelDruid 3.0.7 allows attackers to perform unauthorized actions (e.g., modifying user passwords) on behalf of authenticated users by exploiting the lack of origin or referrer validation and the absence of CSRF tokens. NOTE: this is disputed because there is an id_sessione CSRF token.
  • CVE-2025-25749: An issue in HotelDruid version 3.0.7 and earlier allows users to set weak passwords due to the lack of enforcement of password strength policies.
Created: 2025-03-12 Last update: 2025-05-07 13:31
3 security issues in trixie high

There are 3 open security issues in trixie.

3 important issues:
  • CVE-2025-25747: Cross Site Scripting vulnerability in DigitalDruid HotelDruid v.3.0.7 allows an attacker to execute arbitrary code and obtain sensitive information via the ripristina_backup parameter in the crea_backup.php endpoint
  • CVE-2025-25748: A CSRF vulnerability in the gestione_utenti.php endpoint of HotelDruid 3.0.7 allows attackers to perform unauthorized actions (e.g., modifying user passwords) on behalf of authenticated users by exploiting the lack of origin or referrer validation and the absence of CSRF tokens. NOTE: this is disputed because there is an id_sessione CSRF token.
  • CVE-2025-25749: An issue in HotelDruid version 3.0.7 and earlier allows users to set weak passwords due to the lack of enforcement of password strength policies.
Created: 2025-03-12 Last update: 2025-03-31 13:25
The package has not entered testing even though the delay is over normal
The package has not entered testing even though the 20-day delay is over. Check why.
Created: 2025-04-20 Last update: 2025-05-22 00:32
lintian reports 1 warning normal
Lintian reports 1 warning about this package. You should make the package lintian clean getting rid of them.
Created: 2024-10-05 Last update: 2024-10-05 05:03
16 low-priority security issues in bookworm low

There are 16 open security issues in bookworm.

16 issues left for the package maintainer to handle:
  • CVE-2022-45592: (needs triaging)
  • CVE-2023-29839: (needs triaging) A Stored Cross Site Scripting (XSS) vulnerability exists in multiple pages of Hotel Druid version 3.0.4, which allows arbitrary execution of commands. The vulnerable fields are Surname, Name, and Nickname in the Document function.
  • CVE-2023-33817: (needs triaging) hoteldruid v3.0.5 was discovered to contain a SQL injection vulnerability.
  • CVE-2023-34537: (needs triaging) A Reflected XSS was discovered in HotelDruid version 3.0.5, an attacker can issue malicious code/command on affected webpage's parameter to trick user on browser and/or exfiltrate data.
  • CVE-2023-34854: (needs triaging)
  • CVE-2023-43371: (needs triaging) Hoteldruid v3.0.5 was discovered to contain a SQL injection vulnerability via the numcaselle parameter at /hoteldruid/creaprezzi.php.
  • CVE-2023-43373: (needs triaging) Hoteldruid v3.0.5 was discovered to contain a SQL injection vulnerability via the n_utente_agg parameter at /hoteldruid/interconnessioni.php.
  • CVE-2023-43374: (needs triaging) Hoteldruid v3.0.5 was discovered to contain a SQL injection vulnerability via the id_utente_log parameter at /hoteldruid/personalizza.php.
  • CVE-2023-43375: (needs triaging) Hoteldruid v3.0.5 was discovered to contain multiple SQL injection vulnerabilities at /hoteldruid/clienti.php via the annonascita, annoscaddoc, giornonascita, giornoscaddoc, lingua_cli, mesenascita, and mesescaddoc parameters.
  • CVE-2023-43376: (needs triaging) A cross-site scripting (XSS) vulnerability in /hoteldruid/clienti.php of Hoteldruid v3.0.5 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the nometipotariffa1 parameter.
  • CVE-2023-43377: (needs triaging) A cross-site scripting (XSS) vulnerability in /hoteldruid/visualizza_contratto.php of Hoteldruid v3.0.5 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the destinatario_email1 parameter.
  • CVE-2023-43378: (needs triaging) A cross-site scripting (XSS) vulnerability in Hoteldruid v3.0.5 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the commento1_1 parameter.
  • CVE-2023-47164: (needs triaging) Cross-site scripting vulnerability in HOTELDRUID 3.0.5 and earlier allows a remote unauthenticated attacker to execute an arbitrary script on the web browser of the user who is logging in to the product.
  • CVE-2025-25747: (needs triaging) Cross Site Scripting vulnerability in DigitalDruid HotelDruid v.3.0.7 allows an attacker to execute arbitrary code and obtain sensitive information via the ripristina_backup parameter in the crea_backup.php endpoint
  • CVE-2025-25748: (needs triaging) A CSRF vulnerability in the gestione_utenti.php endpoint of HotelDruid 3.0.7 allows attackers to perform unauthorized actions (e.g., modifying user passwords) on behalf of authenticated users by exploiting the lack of origin or referrer validation and the absence of CSRF tokens. NOTE: this is disputed because there is an id_sessione CSRF token.
  • CVE-2025-25749: (needs triaging) An issue in HotelDruid version 3.0.7 and earlier allows users to set weak passwords due to the lack of enforcement of password strength policies.

You can find information about how to handle these issues in the security team's documentation.

Created: 2023-06-10 Last update: 2025-05-07 13:31
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.7.2 instead of 4.6.2).
Created: 2024-04-07 Last update: 2025-02-27 13:25
testing migrations
  • excuses:
    • Migration status for hoteldruid (- to 3.0.6-1): BLOCKED: Rejected/violates migration policy/introduces a regression
    • Issues preventing migration:
    • ∙ ∙ Updating hoteldruid would introduce bugs in testing: #1101015, #1104020
    • ∙ ∙ blocked by freeze: is not in testing
    • Additional info:
    • ∙ ∙ Piuparts tested OK - https://piuparts.debian.org/sid/source/h/hoteldruid.html
    • ∙ ∙ autopkgtest for hoteldruid/3.0.6-1: amd64: Pass, arm64: Pass, armel: Pass, armhf: Pass, i386: Pass, ppc64el: Pass, riscv64: Pass, s390x: Pass
    • ∙ ∙ Reproducible on amd64 - info ♻
    • ∙ ∙ Reproducible on arm64 - info ♻
    • ∙ ∙ Reproducible on armhf - info ♻
    • ∙ ∙ Reproducible on i386 - info ♻
    • ∙ ∙ 542 days old (needed 20 days)
    • Not considered
news
[rss feed]
  • [2025-04-21] hoteldruid REMOVED from testing (Debian testing watch)
  • [2023-12-04] hoteldruid 3.0.6-1 MIGRATED to testing (Debian testing watch)
  • [2023-11-26] Accepted hoteldruid 3.0.6-1 (source) into unstable (Marco Maria Francesco De Santis) (signed by: Tobias Frost)
  • [2023-10-25] hoteldruid REMOVED from testing (Debian testing watch)
  • [2023-06-21] hoteldruid 3.0.5-1 MIGRATED to testing (Debian testing watch)
  • [2023-06-21] hoteldruid 3.0.5-1 MIGRATED to testing (Debian testing watch)
  • [2023-06-14] Accepted hoteldruid 3.0.5-1 (source) into unstable (Marco Maria Francesco De Santis) (signed by: bage@debian.org)
  • [2022-04-29] hoteldruid 3.0.4-1 MIGRATED to testing (Debian testing watch)
  • [2022-04-22] Accepted hoteldruid 3.0.4-1 (source) into unstable (Marco Maria Francesco De Santis) (signed by: bage@debian.org)
  • [2021-11-19] hoteldruid 3.0.3-1 MIGRATED to testing (Debian testing watch)
  • [2021-11-11] Accepted hoteldruid 3.0.3-1 (source) into unstable (Marco Maria Francesco De Santis) (signed by: bage@debian.org)
  • [2020-02-24] hoteldruid 3.0.1-1 MIGRATED to testing (Debian testing watch)
  • [2020-02-13] Accepted hoteldruid 3.0.1-1 (source) into unstable (Marco Maria Francesco De Santis) (signed by: Adam Borowski)
  • [2019-11-21] hoteldruid 3.0.0-1 MIGRATED to testing (Debian testing watch)
  • [2019-11-10] Accepted hoteldruid 3.0.0-1 (source) into unstable (Marco Maria Francesco De Santis) (signed by: Adam Borowski)
  • [2019-03-10] hoteldruid 2.3.2-1 MIGRATED to testing (Debian testing watch)
  • [2019-02-27] Accepted hoteldruid 2.3.2-1 (source) into unstable (Marco Maria Francesco De Santis) (signed by: Adam Borowski)
  • [2019-01-10] hoteldruid 2.3.0-2 MIGRATED to testing (Debian testing watch)
  • [2019-01-07] Accepted hoteldruid 2.3.0-2 (source) into unstable (Marco Maria Francesco De Santis) (signed by: Adam Borowski)
  • [2018-11-21] hoteldruid 2.3.0-1 MIGRATED to testing (Debian testing watch)
  • [2018-11-10] Accepted hoteldruid 2.3.0-1 (source all) into unstable (Marco Maria Francesco De Santis) (signed by: Herbert Parentes Fortes Neto)
  • [2018-10-19] hoteldruid 2.2.4-1 MIGRATED to testing (Debian testing watch)
  • [2018-10-08] Accepted hoteldruid 2.2.4-1 (source) into unstable (Marco Maria Francesco De Santis) (signed by: Adam Borowski)
  • [2018-06-15] hoteldruid 2.2.3-1 MIGRATED to testing (Debian testing watch)
  • [2018-06-04] Accepted hoteldruid 2.2.3-1 (source) into unstable (Marco Maria Francesco De Santis) (signed by: Adam Borowski)
  • [2018-03-11] hoteldruid 2.2.2-1 MIGRATED to testing (Debian testing watch)
  • [2018-03-01] Accepted hoteldruid 2.2.2-1 (source) into unstable (Marco Maria Francesco De Santis) (signed by: Mattia Rizzolo)
  • [2017-08-09] hoteldruid 2.2.1-1 MIGRATED to testing (Debian testing watch)
  • [2017-07-29] Accepted hoteldruid 2.2.1-1 (source) into unstable (Marco Maria Francesco De Santis) (signed by: Adam Borowski)
  • [2017-01-03] hoteldruid 2.2.0-1 MIGRATED to testing (Debian testing watch)
  • 1
  • 2
bugs [bug history graph]
  • all: 2
  • RC: 2
  • I&N: 0
  • M&W: 0
  • F&P: 0
  • patch: 0
links
  • homepage
  • lintian (0, 1)
  • buildd: logs
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • screenshots
  • l10n (99, -)
  • debian patches
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 3.0.6-1

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing