CVE-2024-46307

A loop hole in the payment logic of Sparkshop v1.16 allows attackers to arbitrarily modify the number of products.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:sparkshop:sparkshop:*:*:*:*:*:*:*:*

History

15 Oct 2024, 14:57

Type Values Removed Values Added
CWE NVD-CWE-noinfo
References () http://sparkshop.com - () http://sparkshop.com - Not Applicable
References () https://gitee.com/sparkshop/sparkshop - () https://gitee.com/sparkshop/sparkshop - Product
References () https://github.com/Yllxx03/CVE/tree/main/CVE-2024-46307 - () https://github.com/Yllxx03/CVE/tree/main/CVE-2024-46307 - Exploit, Third Party Advisory
CPE cpe:2.3:a:sparkshop:sparkshop:*:*:*:*:*:*:*:*
First Time Sparkshop
Sparkshop sparkshop

11 Oct 2024, 21:36

Type Values Removed Values Added
CWE CWE-841
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5

10 Oct 2024, 12:51

Type Values Removed Values Added
Summary
  • (es) Un vacío en la lógica de pago de Sparkshop v1.16 permite a los atacantes modificar arbitrariamente la cantidad de productos.

09 Oct 2024, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-10-09 17:15

Updated : 2024-10-15 14:57


NVD link : CVE-2024-46307

Mitre link : CVE-2024-46307

CVE.ORG link : CVE-2024-46307


JSON object : View

Products Affected

sparkshop

  • sparkshop
CWE
NVD-CWE-noinfo CWE-841

Improper Enforcement of Behavioral Workflow