Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-50968 PoC — itsourcecode Agri-Trading Online Shopping System 安全漏洞

Source
Associated Vulnerability
Title:itsourcecode Agri-Trading Online Shopping System 安全漏洞 (CVE-2024-50968)
Description:itsourcecode Agri-Trading Online Shopping System是itsourcecode开源的一个在线购物系统。 itsourcecode Agri-Trading Online Shopping System 1.0版本存在安全漏洞。攻击者利用该漏洞在将商品添加到购物车时可以操纵 quant 参数。
Readme
# CVE-2024-50968
## Description

A business logic vulnerability exists in the Add to Cart function of itsourcecode Agri-Trading Online Shopping System 1.0, which allows remote attackers to manipulate the quant parameter when adding a product to the cart. By setting the quantity value to -0, an attacker can exploit a flaw in the application's total price calculation logic.This vulnerability causes the total price to be reduced to zero, allowing the attacker to add items to the cart and proceed to checkout.

## Vulnerability Type
Business Logic Vulnerability

## Vendor of Product
itsourcecode

## Affected Product Code Base:
Agri-Trading Online Shopping System - 1.0

## Affected Component:
The Add to Cart functionality in the index.php page of itsourcecode Agri-Trading Online Shopping System version 1.0 is vulnerable

## Attack Vectors:
1. Set up the application locally
2. Open a browser and go to URL
   http://localhost/teambam/index.php
3. Click on the Sign Up button,register the account and login to the account  
4. Upon successful login to the home page, click on Add to Cart on anyone of the product 
5. Open the burpsuite and intercept the request and change the quant parameter value from 1 to -0. Forward the request and the item would be added to the cart.
6. Navigate to the "Cart" section and the total price of the product would be dropped to 0 with the delivery fee of just Rs.150 and can successfully proceed to checkout to place
   the order

## Reference:
1. https://itsourcecode.com/free-projects/php-project/php-project-online-shopping-with-source-code/
2. https://owasp.org/www-community/vulnerabilities/Business_logic_vulnerability
File Snapshot

[4.0K] /data/pocs/c5315f9606baaf5a42f29f42e5d0760b8a00b315 └── [1.6K] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.