Debian Package Tracker
Register | Log in
Subscribe

hoteldruid

web-based property management system for hotels or B&Bs

Choose email to subscribe with

general
  • source: hoteldruid (main)
  • version: 3.0.6-1
  • maintainer: Marco Maria Francesco De Santis (DMD)
  • arch: all
  • std-ver: 4.6.2
  • VCS: unknown
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 2.3.2-1
  • oldstable: 3.0.1-1
  • stable: 3.0.4-1
  • unstable: 3.0.6-1
versioned links
  • 2.3.2-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 3.0.1-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 3.0.4-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 3.0.6-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • hoteldruid
action needed
A new upstream version is available: 3.0.7 high
A new upstream version 3.0.7 is available, you should consider packaging it.
Created: 2024-11-16 Last update: 2025-06-21 15:01
5 security issues in sid high

There are 5 open security issues in sid.

5 important issues:
  • CVE-2023-43378: A cross-site scripting (XSS) vulnerability in Hoteldruid v3.0.5 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the commento1_1 parameter.
  • CVE-2025-25747: Cross Site Scripting vulnerability in DigitalDruid HotelDruid v.3.0.7 allows an attacker to execute arbitrary code and obtain sensitive information via the ripristina_backup parameter in the crea_backup.php endpoint
  • CVE-2025-25748: A CSRF vulnerability in the gestione_utenti.php endpoint of HotelDruid 3.0.7 allows attackers to perform unauthorized actions (e.g., modifying user passwords) on behalf of authenticated users by exploiting the lack of origin or referrer validation and the absence of CSRF tokens. NOTE: this is disputed because there is an id_sessione CSRF token.
  • CVE-2025-25749: An issue in HotelDruid version 3.0.7 and earlier allows users to set weak passwords due to the lack of enforcement of password strength policies.
  • CVE-2025-44203: In HotelDruid 3.0.7, an unauthenticated attacker can exploit verbose SQL error messages on creadb.php before the 'create database' button is pressed. By sending malformed POST requests to this endpoint, the attacker may obtain the administrator username, password hash, and salt. In some cases, the attack results in a Denial of Service (DoS), preventing the administrator from logging in even with the correct credentials.
Created: 2025-03-12 Last update: 2025-06-21 05:00
24 security issues in bullseye high

There are 24 open security issues in bullseye.

1 important issue:
  • CVE-2025-44203: In HotelDruid 3.0.7, an unauthenticated attacker can exploit verbose SQL error messages on creadb.php before the 'create database' button is pressed. By sending malformed POST requests to this endpoint, the attacker may obtain the administrator username, password hash, and salt. In some cases, the attack results in a Denial of Service (DoS), preventing the administrator from logging in even with the correct credentials.
23 issues postponed or untriaged:
  • CVE-2021-37832: (needs triaging) A SQL injection vulnerability exists in version 3.0.2 of Hotel Druid when SQLite is being used as the application database. A malicious attacker can issue SQL commands to the SQLite database through the vulnerable idappartamenti parameter.
  • CVE-2021-37833: (needs triaging) A reflected cross-site scripting (XSS) vulnerability exists in multiple pages in version 3.0.2 of the Hotel Druid application that allows for arbitrary execution of JavaScript commands.
  • CVE-2021-38559: (needs triaging) DigitalDruid HotelDruid 3.0.2 has an XSS vulnerability in prenota.php affecting the fineperiodo1 parameter.
  • CVE-2021-42948: (needs triaging) HotelDruid Hotel Management Software v3.0.3 and below was discovered to have exposed session tokens in multiple links via GET parameters, allowing attackers to access user session id's.
  • CVE-2021-42949: (needs triaging) The component controlla_login function in HotelDruid Hotel Management Software v3.0.3 generates a predictable session token, allowing attackers to bypass authentication via bruteforce attacks.
  • CVE-2022-22909: (needs triaging) HotelDruid v3.0.3 was discovered to contain a remote code execution (RCE) vulnerability which is exploited via an attacker inserting a crafted payload into the name field under the Create New Room module.
  • CVE-2022-26564: (needs triaging) HotelDruid Hotel Management Software v3.0.3 contains a cross-site scripting (XSS) vulnerability via the prezzoperiodo4 parameter in creaprezzi.php.
  • CVE-2022-45592: (needs triaging)
  • CVE-2023-29839: (needs triaging) A Stored Cross Site Scripting (XSS) vulnerability exists in multiple pages of Hotel Druid version 3.0.4, which allows arbitrary execution of commands. The vulnerable fields are Surname, Name, and Nickname in the Document function.
  • CVE-2023-33817: (needs triaging) hoteldruid v3.0.5 was discovered to contain a SQL injection vulnerability.
  • CVE-2023-34537: (needs triaging) A Reflected XSS was discovered in HotelDruid version 3.0.5, an attacker can issue malicious code/command on affected webpage's parameter to trick user on browser and/or exfiltrate data.
  • CVE-2023-34854: (needs triaging)
  • CVE-2023-43371: (needs triaging) Hoteldruid v3.0.5 was discovered to contain a SQL injection vulnerability via the numcaselle parameter at /hoteldruid/creaprezzi.php.
  • CVE-2023-43373: (needs triaging) Hoteldruid v3.0.5 was discovered to contain a SQL injection vulnerability via the n_utente_agg parameter at /hoteldruid/interconnessioni.php.
  • CVE-2023-43374: (needs triaging) Hoteldruid v3.0.5 was discovered to contain a SQL injection vulnerability via the id_utente_log parameter at /hoteldruid/personalizza.php.
  • CVE-2023-43375: (needs triaging) Hoteldruid v3.0.5 was discovered to contain multiple SQL injection vulnerabilities at /hoteldruid/clienti.php via the annonascita, annoscaddoc, giornonascita, giornoscaddoc, lingua_cli, mesenascita, and mesescaddoc parameters.
  • CVE-2023-43376: (needs triaging) A cross-site scripting (XSS) vulnerability in /hoteldruid/clienti.php of Hoteldruid v3.0.5 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the nometipotariffa1 parameter.
  • CVE-2023-43377: (needs triaging) A cross-site scripting (XSS) vulnerability in /hoteldruid/visualizza_contratto.php of Hoteldruid v3.0.5 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the destinatario_email1 parameter.
  • CVE-2023-43378: (postponed; to be fixed through a stable update) A cross-site scripting (XSS) vulnerability in Hoteldruid v3.0.5 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the commento1_1 parameter.
  • CVE-2023-47164: (needs triaging) Cross-site scripting vulnerability in HOTELDRUID 3.0.5 and earlier allows a remote unauthenticated attacker to execute an arbitrary script on the web browser of the user who is logging in to the product.
  • CVE-2025-25747: (postponed; to be fixed through a stable update) Cross Site Scripting vulnerability in DigitalDruid HotelDruid v.3.0.7 allows an attacker to execute arbitrary code and obtain sensitive information via the ripristina_backup parameter in the crea_backup.php endpoint
  • CVE-2025-25748: (postponed; to be fixed through a stable update) A CSRF vulnerability in the gestione_utenti.php endpoint of HotelDruid 3.0.7 allows attackers to perform unauthorized actions (e.g., modifying user passwords) on behalf of authenticated users by exploiting the lack of origin or referrer validation and the absence of CSRF tokens. NOTE: this is disputed because there is an id_sessione CSRF token.
  • CVE-2025-25749: (postponed; to be fixed through a stable update) An issue in HotelDruid version 3.0.7 and earlier allows users to set weak passwords due to the lack of enforcement of password strength policies.
Created: 2025-06-21 Last update: 2025-06-21 05:00
17 security issues in bookworm high

There are 17 open security issues in bookworm.

1 important issue:
  • CVE-2025-44203: In HotelDruid 3.0.7, an unauthenticated attacker can exploit verbose SQL error messages on creadb.php before the 'create database' button is pressed. By sending malformed POST requests to this endpoint, the attacker may obtain the administrator username, password hash, and salt. In some cases, the attack results in a Denial of Service (DoS), preventing the administrator from logging in even with the correct credentials.
16 issues left for the package maintainer to handle:
  • CVE-2022-45592: (needs triaging)
  • CVE-2023-29839: (needs triaging) A Stored Cross Site Scripting (XSS) vulnerability exists in multiple pages of Hotel Druid version 3.0.4, which allows arbitrary execution of commands. The vulnerable fields are Surname, Name, and Nickname in the Document function.
  • CVE-2023-33817: (needs triaging) hoteldruid v3.0.5 was discovered to contain a SQL injection vulnerability.
  • CVE-2023-34537: (needs triaging) A Reflected XSS was discovered in HotelDruid version 3.0.5, an attacker can issue malicious code/command on affected webpage's parameter to trick user on browser and/or exfiltrate data.
  • CVE-2023-34854: (needs triaging)
  • CVE-2023-43371: (needs triaging) Hoteldruid v3.0.5 was discovered to contain a SQL injection vulnerability via the numcaselle parameter at /hoteldruid/creaprezzi.php.
  • CVE-2023-43373: (needs triaging) Hoteldruid v3.0.5 was discovered to contain a SQL injection vulnerability via the n_utente_agg parameter at /hoteldruid/interconnessioni.php.
  • CVE-2023-43374: (needs triaging) Hoteldruid v3.0.5 was discovered to contain a SQL injection vulnerability via the id_utente_log parameter at /hoteldruid/personalizza.php.
  • CVE-2023-43375: (needs triaging) Hoteldruid v3.0.5 was discovered to contain multiple SQL injection vulnerabilities at /hoteldruid/clienti.php via the annonascita, annoscaddoc, giornonascita, giornoscaddoc, lingua_cli, mesenascita, and mesescaddoc parameters.
  • CVE-2023-43376: (needs triaging) A cross-site scripting (XSS) vulnerability in /hoteldruid/clienti.php of Hoteldruid v3.0.5 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the nometipotariffa1 parameter.
  • CVE-2023-43377: (needs triaging) A cross-site scripting (XSS) vulnerability in /hoteldruid/visualizza_contratto.php of Hoteldruid v3.0.5 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the destinatario_email1 parameter.
  • CVE-2023-43378: (needs triaging) A cross-site scripting (XSS) vulnerability in Hoteldruid v3.0.5 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the commento1_1 parameter.
  • CVE-2023-47164: (needs triaging) Cross-site scripting vulnerability in HOTELDRUID 3.0.5 and earlier allows a remote unauthenticated attacker to execute an arbitrary script on the web browser of the user who is logging in to the product.
  • CVE-2025-25747: (needs triaging) Cross Site Scripting vulnerability in DigitalDruid HotelDruid v.3.0.7 allows an attacker to execute arbitrary code and obtain sensitive information via the ripristina_backup parameter in the crea_backup.php endpoint
  • CVE-2025-25748: (needs triaging) A CSRF vulnerability in the gestione_utenti.php endpoint of HotelDruid 3.0.7 allows attackers to perform unauthorized actions (e.g., modifying user passwords) on behalf of authenticated users by exploiting the lack of origin or referrer validation and the absence of CSRF tokens. NOTE: this is disputed because there is an id_sessione CSRF token.
  • CVE-2025-25749: (needs triaging) An issue in HotelDruid version 3.0.7 and earlier allows users to set weak passwords due to the lack of enforcement of password strength policies.

You can find information about how to handle these issues in the security team's documentation.

Created: 2023-06-10 Last update: 2025-06-21 05:00
3 security issues in trixie high

There are 3 open security issues in trixie.

3 important issues:
  • CVE-2025-25747: Cross Site Scripting vulnerability in DigitalDruid HotelDruid v.3.0.7 allows an attacker to execute arbitrary code and obtain sensitive information via the ripristina_backup parameter in the crea_backup.php endpoint
  • CVE-2025-25748: A CSRF vulnerability in the gestione_utenti.php endpoint of HotelDruid 3.0.7 allows attackers to perform unauthorized actions (e.g., modifying user passwords) on behalf of authenticated users by exploiting the lack of origin or referrer validation and the absence of CSRF tokens. NOTE: this is disputed because there is an id_sessione CSRF token.
  • CVE-2025-25749: An issue in HotelDruid version 3.0.7 and earlier allows users to set weak passwords due to the lack of enforcement of password strength policies.
Created: 2025-03-12 Last update: 2025-03-31 13:25
The package has not entered testing even though the delay is over normal
The package has not entered testing even though the 20-day delay is over. Check why.
Created: 2025-04-20 Last update: 2025-06-21 20:33
lintian reports 1 warning normal
Lintian reports 1 warning about this package. You should make the package lintian clean getting rid of them.
Created: 2024-10-05 Last update: 2024-10-05 05:03
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.7.2 instead of 4.6.2).
Created: 2024-04-07 Last update: 2025-02-27 13:25
testing migrations
  • excuses:
    • Migration status for hoteldruid (- to 3.0.6-1): BLOCKED: Rejected/violates migration policy/introduces a regression
    • Issues preventing migration:
    • ∙ ∙ Updating hoteldruid would introduce bugs in testing: #1101015, #1104020
    • ∙ ∙ blocked by freeze: is not in testing
    • Additional info:
    • ∙ ∙ Piuparts tested OK - https://piuparts.debian.org/sid/source/h/hoteldruid.html
    • ∙ ∙ autopkgtest for hoteldruid/3.0.6-1: amd64: Pass, arm64: Pass, armel: Pass, armhf: Pass, i386: Pass, ppc64el: Pass, riscv64: Pass, s390x: Pass
    • ∙ ∙ Reproducible on amd64 - info ♻
    • ∙ ∙ Reproducible on arm64 - info ♻
    • ∙ ∙ Reproducible on armhf - info ♻
    • ∙ ∙ 573 days old (needed 20 days)
    • Not considered
news
[rss feed]
  • [2025-04-21] hoteldruid REMOVED from testing (Debian testing watch)
  • [2023-12-04] hoteldruid 3.0.6-1 MIGRATED to testing (Debian testing watch)
  • [2023-11-26] Accepted hoteldruid 3.0.6-1 (source) into unstable (Marco Maria Francesco De Santis) (signed by: Tobias Frost)
  • [2023-10-25] hoteldruid REMOVED from testing (Debian testing watch)
  • [2023-06-21] hoteldruid 3.0.5-1 MIGRATED to testing (Debian testing watch)
  • [2023-06-21] hoteldruid 3.0.5-1 MIGRATED to testing (Debian testing watch)
  • [2023-06-14] Accepted hoteldruid 3.0.5-1 (source) into unstable (Marco Maria Francesco De Santis) (signed by: bage@debian.org)
  • [2022-04-29] hoteldruid 3.0.4-1 MIGRATED to testing (Debian testing watch)
  • [2022-04-22] Accepted hoteldruid 3.0.4-1 (source) into unstable (Marco Maria Francesco De Santis) (signed by: bage@debian.org)
  • [2021-11-19] hoteldruid 3.0.3-1 MIGRATED to testing (Debian testing watch)
  • [2021-11-11] Accepted hoteldruid 3.0.3-1 (source) into unstable (Marco Maria Francesco De Santis) (signed by: bage@debian.org)
  • [2020-02-24] hoteldruid 3.0.1-1 MIGRATED to testing (Debian testing watch)
  • [2020-02-13] Accepted hoteldruid 3.0.1-1 (source) into unstable (Marco Maria Francesco De Santis) (signed by: Adam Borowski)
  • [2019-11-21] hoteldruid 3.0.0-1 MIGRATED to testing (Debian testing watch)
  • [2019-11-10] Accepted hoteldruid 3.0.0-1 (source) into unstable (Marco Maria Francesco De Santis) (signed by: Adam Borowski)
  • [2019-03-10] hoteldruid 2.3.2-1 MIGRATED to testing (Debian testing watch)
  • [2019-02-27] Accepted hoteldruid 2.3.2-1 (source) into unstable (Marco Maria Francesco De Santis) (signed by: Adam Borowski)
  • [2019-01-10] hoteldruid 2.3.0-2 MIGRATED to testing (Debian testing watch)
  • [2019-01-07] Accepted hoteldruid 2.3.0-2 (source) into unstable (Marco Maria Francesco De Santis) (signed by: Adam Borowski)
  • [2018-11-21] hoteldruid 2.3.0-1 MIGRATED to testing (Debian testing watch)
  • [2018-11-10] Accepted hoteldruid 2.3.0-1 (source all) into unstable (Marco Maria Francesco De Santis) (signed by: Herbert Parentes Fortes Neto)
  • [2018-10-19] hoteldruid 2.2.4-1 MIGRATED to testing (Debian testing watch)
  • [2018-10-08] Accepted hoteldruid 2.2.4-1 (source) into unstable (Marco Maria Francesco De Santis) (signed by: Adam Borowski)
  • [2018-06-15] hoteldruid 2.2.3-1 MIGRATED to testing (Debian testing watch)
  • [2018-06-04] Accepted hoteldruid 2.2.3-1 (source) into unstable (Marco Maria Francesco De Santis) (signed by: Adam Borowski)
  • [2018-03-11] hoteldruid 2.2.2-1 MIGRATED to testing (Debian testing watch)
  • [2018-03-01] Accepted hoteldruid 2.2.2-1 (source) into unstable (Marco Maria Francesco De Santis) (signed by: Mattia Rizzolo)
  • [2017-08-09] hoteldruid 2.2.1-1 MIGRATED to testing (Debian testing watch)
  • [2017-07-29] Accepted hoteldruid 2.2.1-1 (source) into unstable (Marco Maria Francesco De Santis) (signed by: Adam Borowski)
  • [2017-01-03] hoteldruid 2.2.0-1 MIGRATED to testing (Debian testing watch)
  • 1
  • 2
bugs [bug history graph]
  • all: 3
  • RC: 3
  • I&N: 0
  • M&W: 0
  • F&P: 0
  • patch: 0
links
  • homepage
  • lintian (0, 1)
  • buildd: logs
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • screenshots
  • l10n (99, -)
  • debian patches
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 3.0.6-1

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing