Oracle Opera, a widely used property management system used in the hospitality industry, is at risk of being exploited by unauthenticated remote attackers to access sensitive information, according to a group of researchers. Oracle has released patches to fix the vulnerability (CVE-2023-21932), which affects version 5.6 of its Oracle Hospitality OPERA 5 Property Services product.
Researchers say that attackers can easily achieve pre-auth command execution and gain access to sensitive data without any authentication. The researchers are calling for a thorough code security audit of the product, which they say still contains unpatched vulnerabilities such as XXE, Arb File Write, and Full Read SSRF.
Oracle has said the vulnerability is difficult to exploit and the attacker needs high privileges and network access via HTTP. However, researchers disagree, showing that attackers can break the solutions’ encryption scheme, obtain a JNDI connection name from specific URLs and upload a CGI web shell to the local file system.
With a large number of unpatched internet-facing installations of Oracle Opera out there, attackers may quickly start exploiting the flaw to grab sensitive data. The dated design of the solution’s landing page and its specialized nature made it an easy target for researchers to investigate.
According to security researcher Kevin Beaumont, there are a number of queries one can use on Shodan to pinpoint exposed systems, and every one he has found so far is unpatched.
The vulnerability should have a CVSS score of 10.0, say the researchers, who were able to leverage the bug to gain access to one of the largest resorts in the US during a live hacking event. Organizations using the Oracle Opera solution have been urged to implement the patches provided by Oracle in April and to get the system off the external internet.