A vulnerability, which was classified as problematic, has been found in spa-cartcms 1.9.0.6. This issue affects some unknown processing of the file /checkout of the component Checkout Page. The manipulation of the argument quantity with the input -10 leads to enforcement of behavioral workflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-268895.
The product supports a session in which more than one behavior must be performed by an actor, but it does not properly ensure that the actor performs the behaviors in the required sequence.
Link | Tags |
---|---|
https://vuldb.com/?id.268895 | third party advisory vdb entry technical description |
https://vuldb.com/?ctiid.268895 | signature permissions required |
https://seclists.org/fulldisclosure/2024/Jun/6 | mailing list third party advisory exploit |
https://msecureltd.blogspot.com/2024/04/friday-fun-pentest-series-5-spa.html | third party advisory exploit |