| Título | linlinjava litemall latest broken function level authorization |
|---|
| Descrição | An attacker, as an authenticated user, initiates a request to cancel an aftersale application that they legitimately own. Let's say the aftersale application has an id of 123.
The attacker intercepts the request sent to the /wx/aftersale/cancel endpoint.
The original request body might look like this: {"id": 123}.
The attacker modifies the request body to include other fields of the LitemallAftersale object with arbitrary values. For example, they could change the orderId to an order that does not belong to them, or modify the refund amount. |
|---|
| Fonte | ⚠️ https://www.cnblogs.com/aibot/p/19063376 |
|---|
| Utilizador | Anonymous User |
|---|
| Submissão | 28/08/2025 17h34 (há 8 meses) |
|---|
| Moderação | 11/09/2025 20h26 (14 days later) |
|---|
| Estado | Aceite |
|---|
| Entrada VulDB | 323717 [linlinjava litemall até 1.8.0 /wx/aftersale/cancel WxAftersaleController ID Elevação de Privilégios] |
|---|
| Pontos | 20 |
|---|