CVE-2025-61546

9.1 CRITICAL

📋 TL;DR

This vulnerability in Print Shop Pro WebDesk allows remote attackers to purchase items with negative quantities, creating financial discrepancies by manipulating prices. It affects organizations using edu Business Solutions Print Shop Pro WebDesk version 18.34. The issue stems from insufficient server-side validation of client input.

💻 Affected Systems

Products:
  • edu Business Solutions Print Shop Pro WebDesk
Versions: 18.34
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the specific endpoint /PSP/appNET/Store/CartV12.aspx/GetUnitPrice in version 18.34.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could cause significant financial losses by generating negative charges, refunds, or manipulating inventory values, potentially leading to accounting fraud and revenue loss.

🟠

Likely Case

Attackers exploit the vulnerability to purchase items at negative prices, effectively receiving payments instead of making purchases, creating financial discrepancies.

🟢

If Mitigated

With proper server-side validation, all quantity inputs are validated before processing, preventing negative quantity exploitation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires access to the shopping cart functionality but is technically simple once authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Unknown

Restart Required: No

Instructions:

No official patch available. Implement server-side validation for quantity inputs in the GetUnitPrice endpoint.

🔧 Temporary Workarounds

Implement Server-Side Validation

windows

Add server-side validation to reject negative quantity values in the GetUnitPrice endpoint.

Modify CartV12.aspx.cs to validate quantity > 0 before processing

Web Application Firewall Rule

all

Block requests with negative quantity parameters to the vulnerable endpoint.

WAF rule: Block if request_uri contains '/GetUnitPrice' and quantity parameter < 0

🧯 If You Can't Patch

  • Disable the /PSP/appNET/Store/CartV12.aspx/GetUnitPrice endpoint if not essential
  • Implement additional monitoring for unusual purchase patterns and negative quantity transactions

🔍 How to Verify

Check if Vulnerable:

Test by sending a POST request to /PSP/appNET/Store/CartV12.aspx/GetUnitPrice with a negative quantity parameter and check if it processes.

Check Version:

Check web interface or configuration files for version 18.34

Verify Fix Applied:

Attempt the same negative quantity request; it should be rejected with proper validation error.

📡 Detection & Monitoring

Log Indicators:

  • HTTP POST requests to /PSP/appNET/Store/CartV12.aspx/GetUnitPrice with negative quantity parameters
  • Unusual purchase transactions with negative values

Network Indicators:

  • POST requests containing 'quantity=-[number]' to the vulnerable endpoint

SIEM Query:

source='web_server' AND uri_path='/PSP/appNET/Store/CartV12.aspx/GetUnitPrice' AND (quantity<0 OR quantity LIKE '%-%')

🔗 References

📤 Share & Export