| Title | PHP-Bookstore-Website-Example web 1 Business Logic Errors |
|---|
| Description | The project named PHP-Bookstore-Website-Example has a payment logic vulnerability. Download the project to your local machine, modify a series of configuration files, and after successfully configuring the database, you can access the website's homepage. Once on the website's homepage, the product quantity can be directly modified to a negative number, and the total product price will also be negative. |
|---|
| Source | ⚠️ https://github.com/Lianhaorui/Report/blob/main/Payment%20Logic%20Vulnerability.docx |
|---|
| User | lianhaorui (UID 91045) |
|---|
| Submission | 10/09/2025 04:17 (7 months ago) |
|---|
| Moderation | 10/10/2025 14:29 (1 day later) |
|---|
| Status | Accepted |
|---|
| VulDB entry | 327915 [ywxbear PHP-Bookstore-Website-Example up to 0e0b9f542f7a2d90a8d7f8c83caca69294e234e4 Quantity /index.php improper validation of specified quantity in input] |
|---|
| Points | 19 |
|---|