POC详情: c5315f9606baaf5a42f29f42e5d0760b8a00b315

来源
关联漏洞
标题: itsourcecode Agri-Trading Online Shopping System 安全漏洞 (CVE-2024-50968)
描述:itsourcecode Agri-Trading Online Shopping System是itsourcecode开源的一个在线购物系统。 itsourcecode Agri-Trading Online Shopping System 1.0版本存在安全漏洞。攻击者利用该漏洞在将商品添加到购物车时可以操纵 quant 参数。
介绍
# CVE-2024-50968
## Description

A business logic vulnerability exists in the Add to Cart function of itsourcecode Agri-Trading Online Shopping System 1.0, which allows remote attackers to manipulate the quant parameter when adding a product to the cart. By setting the quantity value to -0, an attacker can exploit a flaw in the application's total price calculation logic.This vulnerability causes the total price to be reduced to zero, allowing the attacker to add items to the cart and proceed to checkout.

## Vulnerability Type
Business Logic Vulnerability

## Vendor of Product
itsourcecode

## Affected Product Code Base:
Agri-Trading Online Shopping System - 1.0

## Affected Component:
The Add to Cart functionality in the index.php page of itsourcecode Agri-Trading Online Shopping System version 1.0 is vulnerable

## Attack Vectors:
1. Set up the application locally
2. Open a browser and go to URL
   http://localhost/teambam/index.php
3. Click on the Sign Up button,register the account and login to the account  
4. Upon successful login to the home page, click on Add to Cart on anyone of the product 
5. Open the burpsuite and intercept the request and change the quant parameter value from 1 to -0. Forward the request and the item would be added to the cart.
6. Navigate to the "Cart" section and the total price of the product would be dropped to 0 with the delivery fee of just Rs.150 and can successfully proceed to checkout to place
   the order

## Reference:
1. https://itsourcecode.com/free-projects/php-project/php-project-online-shopping-with-source-code/
2. https://owasp.org/www-community/vulnerabilities/Business_logic_vulnerability
文件快照

[4.0K] /data/pocs/c5315f9606baaf5a42f29f42e5d0760b8a00b315 └── [1.6K] README.md 0 directories, 1 file
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。