Improper Access Control

Affecting cezerin package, ALL versions

Do your applications use this vulnerable package? Test your applications

Overview

cezerin is a React and Node.js based eCommerce platform.

Affected versions of this package are vulnerable to Improper Access Control. Certain internal attributes (e.g., paid and tax) within getValidDocumentForUpdate in src/api/server/services/orders/orders.js function can be overwritten via a conflicting name from user-input. As such, it is possible for a malicious customer to manipulate certain order status (i.e., payment status, tax) by adding additional attributes to user-input during checkout.

Remediation

There is no fixed version for cezerin.

References

CVSS Score

7.1
high severity

Exploit: POC
  • Attack Vector
    Network
  • Attack Complexity
    Low
  • Privileges Required
    Low
  • User Interaction
    None
  • Scope
    Unchanged
  • Confidentiality
    High
  • Integrity
    None
  • Availability
    Low
  • Exploit maturity
    Proof of Concept
  • Remediation Level
    Unavailable
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L/E:P/RL:U/RC:C
Credit
Unknown
CVE
CVE-2019-18608
CWE
CWE-284
Snyk ID
SNYK-JS-CEZERIN-474608
Disclosed
29 Oct, 2019
Published
29 Oct, 2019