A vulnerability classified as problematic was found in SourceCodester Food Ordering Management System 1.0. This vulnerability affects unknown code of the file /foms/routers/place-order.php of the component Price Handler. The manipulation of the argument total leads to improper validation of specified quantity in input. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
The product receives input that is expected to specify a quantity (such as size or length), but it does not validate or incorrectly validates that the quantity has the required properties.
Link | Tags |
---|---|
https://vuldb.com/?id.276778 | third party advisory vdb entry permissions required technical description |
https://vuldb.com/?ctiid.276778 | signature third party advisory vdb entry permissions required |
https://vuldb.com/?submit.403345 | third party advisory vdb entry |
https://github.com/Niu-zida/cve/blob/main/Payment%20loopholes.md | third party advisory exploit |
https://www.sourcecodester.com/ | product |