CVE-2024-44314

6.5 MEDIUM

📋 TL;DR

CVE-2024-44314 is an incorrect access control vulnerability in TastyIgniter 3.7.6 that allows unauthorized users to remotely update order statuses. This affects all TastyIgniter installations running version 3.7.6 with the orders management system enabled. Attackers can manipulate order workflows without proper authentication.

💻 Affected Systems

Products:
  • TastyIgniter
Versions: 3.7.6
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects installations with the orders management system enabled. The vulnerability is in the core application code.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete disruption of order processing, financial fraud through order status manipulation, and potential data integrity compromise across all orders.

🟠

Likely Case

Unauthorized order status changes leading to operational confusion, incorrect order fulfillment, and customer service issues.

🟢

If Mitigated

Minimal impact with proper access controls and monitoring in place to detect unauthorized order modifications.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires some user access but not the specific order modification permission. The vulnerability is well-documented with code references available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.7.7 or later

Vendor Advisory: https://github.com/tastyigniter/TastyIgniter/security/advisories

Restart Required: No

Instructions:

1. Backup your TastyIgniter installation and database. 2. Update to TastyIgniter version 3.7.7 or later via the admin panel or manual update. 3. Verify the Orders.php file has proper permission checks in index_onUpdateStatus() function.

🔧 Temporary Workarounds

Temporary Access Restriction

all

Restrict access to the orders management endpoint until patching is complete.

# Add to .htaccess if using Apache:
RewriteRule ^admin/orders/update-status - [F,L]
# Add to nginx config if using nginx:
location ~ ^/admin/orders/update-status { deny all; }

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can reach the TastyIgniter admin interface.
  • Enable detailed logging of all order status changes and monitor for unauthorized modifications.

🔍 How to Verify

Check if Vulnerable:

Check if running TastyIgniter version 3.7.6 by viewing the admin dashboard or checking the composer.json file.

Check Version:

php artisan igniter:version

Verify Fix Applied:

Verify the Orders.php file contains proper permission checks in the index_onUpdateStatus() function and that you're running version 3.7.7 or later.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized order status change attempts
  • Order status updates from non-admin users
  • Multiple rapid order status changes

Network Indicators:

  • POST requests to /admin/orders/update-status from unauthorized IPs
  • Unusual order modification patterns

SIEM Query:

source="tastyigniter.log" AND ("order status updated" OR "update-status") AND NOT user_role="admin"

🔗 References

📤 Share & Export