代码拉取完成,页面将自动刷新
Recently, our team found an arbitrary cart access vulnerability in the latest version of the project.
The vulnerability logic is present in the file:https://gitee.com/tiankong0310/my-shop/blob/master/my-shop-goods/src/main/java/com/fengdu/controller/CartController.java#57.
The operation com.fengdu.dao.CartDao.queryObject
is not protected by permission checks,
while the request of path /info/{id}
is also unauthorized, which means an attacker can achieve arbitrary cart access.
To address this vulnerability, we strongly advise that developers implement access control policies that limit API access to admin users or the owner.