Coder Social home page Coder Social logo

d2c-cai / shop-mall Goto Github PK

View Code? Open in Web Editor NEW
123.0 123.0 49.0 1.08 MB

SpringBoot(2.0.5)+MybatisPlus(3.0.7)项目骨架,支持SpringSecurity+JWT权限验证,整合Redis+MongoDB+RabbitMQ+Elasticseach,Quartz定时任务,EasyPoi的Excel导出,Swagger2接口文档,工具包Lombok/FastJson/Hutool/Jasypt

License: Other

Dockerfile 0.47% Java 99.53%

shop-mall's People

Contributors

d2c-cai avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

shop-mall's Issues

[security vulnerability] Arbitrary Order Payment Vulnerability

Recently, our team found an arbitrary order payment vulnerability in the latest version of the project. The vulnerability logic is present in the file:
https://github.com/D2C-Cai/shop-mall/blob/master/shop-api/shop-api-customer/src/main/java/com/d2c/shop/customer/api/OrderController.java#L315

image

Unauthorized access to the /c_api/order/pay API enables attackers to manipulate the param id and change the payment status of any order.
To address this vulnerability, we strongly recommend that developers implement access control policies to ensure that only privileged users or the order owner are authorized to perform the operation.

[security vulnerability] Arbitrary Order Detail Access Vulnerability

Recently, our team found an arbitrary order detail access vulnerability in the latest version of the project (different with #7). The vulnerability logic is present in the file:
https://github.com/D2C-Cai/shop-mall/blob/master/shop-api/shop-api-customer/src/main/java/com/d2c/shop/customer/api/OrderController.java#L425

Access to the /c_api/order/{id} API is unauthorized, allowing attackers to manipulate the path variable id and access other users' order details, potentially compromising user privacy data.

image

To address this vulnerability, we strongly recommend that developers implement access control policies to ensure that only privileged users or the owner can access the order information.

[security vulnerability] Arbitrary Order Item Detail Access Vulnerability

Recently, our team found an arbitrary order item detail access vulnerability in the latest version of the project. The vulnerability logic is present in the file:
https://github.com/D2C-Cai/shop-mall/blob/master/shop-api/shop-api-business/src/main/java/com/d2c/shop/business/api/OrderItemController.java#L53

Access to the /b_api/order_item/{id} API is unauthorized, allowing attackers to manipulate the path variable id and access other users' order item details, potentially compromising user privacy data.

image

To address this vulnerability, we strongly recommend that developers implement access control policies to ensure that only privileged users or the owner can access the order information.

[security vulnerability] Arbitrary Order Item Detail Access Vulnerability

Recently, our team found an arbitrary order item detail access vulnerability (different with #10) in the latest version of the project. The vulnerability logic is present in the file:
https://github.com/D2C-Cai/shop-mall/blob/master/shop-api/shop-api-customer/src/main/java/com/d2c/shop/customer/api/OrderItemController.java#L70

Access to the /c_api/order_item/{id} API is unauthorized, allowing attackers to manipulate the path variable id and access other users' order item details, potentially compromising user privacy data.

image

To address this vulnerability, we strongly recommend that developers implement access control policies to ensure that only privileged users or the owner can access the order information.

[security vulnerability] Arbitrary Order Detail Access Vulnerability

Recently, our team found an arbitrary order detail access vulnerability in the latest version of the project. The vulnerability logic is present in the file:
https://github.com/D2C-Cai/shop-mall/blob/master/shop-api/shop-api-business/src/main/java/com/d2c/shop/business/api/OrderController.java#L73

Access to the /b_api/order/{id} API is unauthorized, allowing attackers to manipulate the path variable id and access other users' order details, potentially compromising user privacy data.

image

To address this vulnerability, we strongly recommend that developers implement access control policies to ensure that only privileged users or the owner can access the order information.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.