### 简要描述:
逻辑错误,导致可以0元购物
### 详细说明:
使用官方demo站点做演示
http://demo.yxcms.net/
实例如:
实例:
```
http://www.lesuzhou.com/index.php
http://www.k3led.cn/led/index.php
http://qy002.demo.jz004.com/index.php
http://www.sscproxy.com/index.php
http://www.cctv1949.com/index.php
```
等
宝马x1 90 W哦,我们买两个吧,哎,屌丝买不起,可是这个存在漏洞,那么还是有可能不是,看看屌丝也可以买X1,而且是两个哦
[<img src="https://images.seebug.org/upload/201505/051309301878024dbd02c159bb37de8dce7dba12.jpg" alt="1.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201505/051309301878024dbd02c159bb37de8dce7dba12.jpg)
burp suite修改截获提交参数修改,价格为-10,数量为2
[<img src="https://images.seebug.org/upload/201505/05131029ec923bebcc16e6ed2bbe8312b4d2c569.jpg" alt="2.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201505/05131029ec923bebcc16e6ed2bbe8312b4d2c569.jpg)
然后提交,参数,单价已经被修改
[<img src="https://images.seebug.org/upload/201505/051312098faf0032ced7af57190e62110e89f529.jpg" alt="3.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201505/051312098faf0032ced7af57190e62110e89f529.jpg)
继续
[<img src="https://images.seebug.org/upload/201505/0513124536d61c3eeed5d11651b4b25ddd57c16a.jpg" alt="4.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201505/0513124536d61c3eeed5d11651b4b25ddd57c16a.jpg)
[<img src="https://images.seebug.org/upload/201505/051313364ae346cfa15b3f26f446539642728c73.jpg" alt="5.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201505/051313364ae346cfa15b3f26f446539642728c73.jpg)
[<img src="https://images.seebug.org/upload/201505/05131517d2c3832d170817985e02b73e29c9ded3.jpg" alt="6.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201505/05131517d2c3832d170817985e02b73e29c9ded3.jpg)
我们用余额支付
[<img src="https://images.seebug.org/upload/201505/0513155836ca23fa9e6a27afda242a4894478f08.jpg" alt="7.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201505/0513155836ca23fa9e6a27afda242a4894478f08.jpg)
支付成功了
### 漏洞证明:
订单支付成功了
[<img src="https://images.seebug.org/upload/201505/051317027d7bb1b1e2b3798db262554be342219e.jpg" alt="8.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201505/051317027d7bb1b1e2b3798db262554be342219e.jpg)
[<img src="https://images.seebug.org/upload/201505/05131750f73a7984291eb440374f3250df9913b9.jpg" alt="9.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201505/05131750f73a7984291eb440374f3250df9913b9.jpg)
我们来看下账户余额
[<img src="https://images.seebug.org/upload/201505/05131854dc3ae04ee77a85bb4f6832741bfe4466.jpg" alt="10.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201505/05131854dc3ae04ee77a85bb4f6832741bfe4466.jpg)
暂无评论