A loop hole in the payment logic of Sparkshop v1.16 allows attackers to arbitrarily modify the number of products.
The product supports a session in which more than one behavior must be performed by an actor, but it does not properly ensure that the actor performs the behaviors in the required sequence.
Link | Tags |
---|---|
http://sparkshop.com | not applicable |
https://gitee.com/sparkshop/sparkshop | product |
https://github.com/Yllxx03/CVE/tree/main/CVE-2024-46307 | third party advisory exploit |