CVE-2023-45854

7.5 HIGH

📋 TL;DR

An integer overflow vulnerability in Shopkit 1.0 allows attackers to add products with negative quantities to shopping carts via the qtd parameter. This enables potential financial manipulation through cart total miscalculations. All Shopkit 1.0 installations are affected.

💻 Affected Systems

Products:
  • Shopkit
Versions: 1.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: All Shopkit 1.0 installations are vulnerable regardless of configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete financial loss through negative cart totals leading to refunds or free products, inventory system corruption, and potential data integrity issues.

🟠

Likely Case

Partial financial loss through manipulated cart totals, inventory discrepancies, and minor business logic disruption.

🟢

If Mitigated

No financial impact with proper input validation, but potential for attempted exploitation attempts in logs.

🌐 Internet-Facing: HIGH - Web applications are directly accessible and the exploit requires no authentication.
🏢 Internal Only: MEDIUM - Internal users could exploit but would require access to the application interface.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple HTTP request manipulation required. Public disclosure includes technical details.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: No

Instructions:

No official patch available. Consider upgrading to a maintained version if available or implementing workarounds.

🔧 Temporary Workarounds

Input Validation Filter

all

Add server-side validation to reject negative quantity values in add-to-cart requests.

Modify add-to-cart function to validate qtd parameter > 0 before processing

WAF Rule

all

Block requests with negative qtd parameter values at the web application firewall level.

Add WAF rule: Block if request parameter 'qtd' contains negative number pattern

🧯 If You Can't Patch

  • Implement strict input validation at application layer to reject negative quantity values
  • Monitor cart totals and inventory changes for anomalous patterns indicating exploitation

🔍 How to Verify

Check if Vulnerable:

Test by sending add-to-cart request with qtd=-1 parameter and check if cart accepts negative quantity.

Check Version:

Check Shopkit version in admin panel or configuration files

Verify Fix Applied:

Attempt same exploit after implementing fixes - should receive error or rejection for negative quantities.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests with negative qtd parameter values
  • Unusual cart total calculations (negative totals)
  • Inventory quantity anomalies

Network Indicators:

  • HTTP POST requests to add-to-cart endpoint with qtd parameter containing negative values

SIEM Query:

web_requests | where url contains 'add-to-cart' and parameters contains 'qtd=-'

🔗 References

📤 Share & Export