CVE-2024-6128

A vulnerability, which was classified as problematic, has been found in spa-cartcms 1.9.0.6. This issue affects some unknown processing of the file /checkout of the component Checkout Page. The manipulation of the argument quantity with the input -10 leads to enforcement of behavioral workflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-268895.
References
Link Resource
https://msecureltd.blogspot.com/2024/04/friday-fun-pentest-series-5-spa.html Exploit Third Party Advisory
https://seclists.org/fulldisclosure/2024/Jun/6 Exploit Mailing List Third Party Advisory
https://vuldb.com/?ctiid.268895 Permissions Required
https://vuldb.com/?id.268895 Third Party Advisory
https://msecureltd.blogspot.com/2024/04/friday-fun-pentest-series-5-spa.html Exploit Third Party Advisory
https://seclists.org/fulldisclosure/2024/Jun/6 Exploit Mailing List Third Party Advisory
https://vuldb.com/?ctiid.268895 Permissions Required
https://vuldb.com/?id.268895 Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:spa-cart:spa-cartcms:1.9.0.6:*:*:*:*:*:*:*

History

21 Nov 2024, 09:49

Type Values Removed Values Added
References () https://msecureltd.blogspot.com/2024/04/friday-fun-pentest-series-5-spa.html - Exploit, Third Party Advisory () https://msecureltd.blogspot.com/2024/04/friday-fun-pentest-series-5-spa.html - Exploit, Third Party Advisory
References () https://seclists.org/fulldisclosure/2024/Jun/6 - Exploit, Mailing List, Third Party Advisory () https://seclists.org/fulldisclosure/2024/Jun/6 - Exploit, Mailing List, Third Party Advisory
References () https://vuldb.com/?ctiid.268895 - Permissions Required () https://vuldb.com/?ctiid.268895 - Permissions Required
References () https://vuldb.com/?id.268895 - Third Party Advisory () https://vuldb.com/?id.268895 - Third Party Advisory

20 Sep 2024, 23:21

Type Values Removed Values Added
CPE cpe:2.3:a:spa-cart:spa-cartcms:1.9.0.6:*:*:*:*:*:*:*
First Time Spa-cart
Spa-cart spa-cartcms
CWE NVD-CWE-Other
References () https://msecureltd.blogspot.com/2024/04/friday-fun-pentest-series-5-spa.html - () https://msecureltd.blogspot.com/2024/04/friday-fun-pentest-series-5-spa.html - Exploit, Third Party Advisory
References () https://seclists.org/fulldisclosure/2024/Jun/6 - () https://seclists.org/fulldisclosure/2024/Jun/6 - Exploit, Mailing List, Third Party Advisory
References () https://vuldb.com/?ctiid.268895 - () https://vuldb.com/?ctiid.268895 - Permissions Required
References () https://vuldb.com/?id.268895 - () https://vuldb.com/?id.268895 - Third Party Advisory

20 Jun 2024, 12:44

Type Values Removed Values Added
Summary
  • (es) Una vulnerabilidad fue encontrada en spa-cartcms 1.9.0.6 y clasificada como problemática. Este problema afecta un procesamiento desconocido del archivo /checkout de la página de pago del componente. La manipulación del argumento cantidad con la entrada -10 conduce a la aplicación del flujo de trabajo conductual. El ataque puede iniciarse de forma remota. El exploit ha sido divulgado al público y puede utilizarse. El identificador asociado de esta vulnerabilidad es VDB-268895.

18 Jun 2024, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-18 21:15

Updated : 2024-11-21 09:49


NVD link : CVE-2024-6128

Mitre link : CVE-2024-6128

CVE.ORG link : CVE-2024-6128


JSON object : View

Products Affected

spa-cart

  • spa-cartcms
CWE
CWE-841

Improper Enforcement of Behavioral Workflow

NVD-CWE-Other