提交 #643390: linlinjava litemall latest broken function level authorization信息

标题linlinjava litemall latest broken function level authorization
描述An attacker, as an authenticated user, initiates a request to cancel an aftersale application that they legitimately own. Let's say the aftersale application has an id of 123. The attacker intercepts the request sent to the /wx/aftersale/cancel endpoint. The original request body might look like this: {"id": 123}. The attacker modifies the request body to include other fields of the LitemallAftersale object with arbitrary values. For example, they could change the orderId to an order that does not belong to them, or modify the refund amount.
来源⚠️ https://www.cnblogs.com/aibot/p/19063376
用户
 Anonymous User
提交2025-08-28 17時34分 (8 月前)
管理2025-09-11 20時26分 (14 days later)
状态已接受
VulDB条目323717 [linlinjava litemall 直到 1.8.0 /wx/aftersale/cancel WxAftersaleController 标识符 权限提升]
积分20

Interested in the pricing of exploits?

See the underground prices here!