Cezerin v0.33.0 allows unauthorized order-information modification because certain internal attributes can be overwritten via a conflicting name when processing order requests. Hence, a malicious customer can manipulate an order (e.g., its payment status or shipping fee) by adding additional attributes to user-input during the PUT /ajax/cart operation for a checkout, because of getValidDocumentForUpdate in api/server/services/orders/orders.js.
References
Link | Resource |
---|---|
https://github.com/cl0udz/vulnerabilities/blob/master/cezerin-manipulate_order_information/README.md | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2019-10-29 19:15
Updated : 2024-02-04 20:39
NVD link : CVE-2019-18608
Mitre link : CVE-2019-18608
CVE.ORG link : CVE-2019-18608
JSON object : View
Products Affected
cezerin
- cezerin
CWE