Recently, our team found an arbitrary goods change vulnerability in the latest version of the project.
The vulnerability logic is present in the file:
|
mallGoodsInfoRouter.PUT("goods/status/:status", mallGoodsInfoApi.ChangeGoodsInfoByIds) // 上下架 |
.
The operation is not protected by permission checks, which means an attacker can achieve arbitrary goods change.
To address this vulnerability, we strongly advise that developers implement access control policies that limit API access to admin users or the owner.
Recently, our team found an arbitrary goods change vulnerability in the latest version of the project.
The vulnerability logic is present in the file:
newbee-mall-api-go/router/manage/manage_goods_info.go
Line 17 in 0f97168
The operation is not protected by permission checks, which means an attacker can achieve arbitrary goods change.
To address this vulnerability, we strongly advise that developers implement access control policies that limit API access to admin users or the owner.