| 标题 | linlinjava litemall latest broken function level authorization |
|---|
| 描述 | An attacker, as an authenticated user, initiates a request to cancel an aftersale application that they legitimately own. Let's say the aftersale application has an id of 123.
The attacker intercepts the request sent to the /wx/aftersale/cancel endpoint.
The original request body might look like this: {"id": 123}.
The attacker modifies the request body to include other fields of the LitemallAftersale object with arbitrary values. For example, they could change the orderId to an order that does not belong to them, or modify the refund amount. |
|---|
| 来源 | ⚠️ https://www.cnblogs.com/aibot/p/19063376 |
|---|
| 用户 | Anonymous User |
|---|
| 提交 | 2025-08-28 17時34分 (8 月前) |
|---|
| 管理 | 2025-09-11 20時26分 (14 days later) |
|---|
| 状态 | 已接受 |
|---|
| VulDB条目 | 323717 [linlinjava litemall 直到 1.8.0 /wx/aftersale/cancel WxAftersaleController 标识符 权限提升] |
|---|
| 积分 | 20 |
|---|