### 简要描述: 逻辑错误,导致可以0元购物 ### 详细说明: 使用官方demo站点做演示 http://demo.yxcms.net/ 实例如: 实例: ``` http://www.lesuzhou.com/index.php http://www.k3led.cn/led/index.php http://qy002.demo.jz004.com/index.php http://www.sscproxy.com/index.php http://www.cctv1949.com/index.php ``` 等 宝马x1 90 W哦,我们买两个吧,哎,屌丝买不起,可是这个存在漏洞,那么还是有可能不是,看看屌丝也可以买X1,而且是两个哦 [<img src="https://images.seebug.org/upload/201505/051309301878024dbd02c159bb37de8dce7dba12.jpg" alt="1.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201505/051309301878024dbd02c159bb37de8dce7dba12.jpg) burp suite修改截获提交参数修改,价格为-10,数量为2 [<img src="https://images.seebug.org/upload/201505/05131029ec923bebcc16e6ed2bbe8312b4d2c569.jpg" alt="2.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201505/05131029ec923bebcc16e6ed2bbe8312b4d2c569.jpg) 然后提交,参数,单价已经被修改 [<img src="https://images.seebug.org/upload/201505/051312098faf0032ced7af57190e62110e89f529.jpg" alt="3.jpg" width="600"...
### 简要描述: 逻辑错误,导致可以0元购物 ### 详细说明: 使用官方demo站点做演示 http://demo.yxcms.net/ 实例如: 实例: ``` http://www.lesuzhou.com/index.php http://www.k3led.cn/led/index.php http://qy002.demo.jz004.com/index.php http://www.sscproxy.com/index.php http://www.cctv1949.com/index.php ``` 等 宝马x1 90 W哦,我们买两个吧,哎,屌丝买不起,可是这个存在漏洞,那么还是有可能不是,看看屌丝也可以买X1,而且是两个哦 [<img src="https://images.seebug.org/upload/201505/051309301878024dbd02c159bb37de8dce7dba12.jpg" alt="1.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201505/051309301878024dbd02c159bb37de8dce7dba12.jpg) burp suite修改截获提交参数修改,价格为-10,数量为2 [<img src="https://images.seebug.org/upload/201505/05131029ec923bebcc16e6ed2bbe8312b4d2c569.jpg" alt="2.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201505/05131029ec923bebcc16e6ed2bbe8312b4d2c569.jpg) 然后提交,参数,单价已经被修改 [<img src="https://images.seebug.org/upload/201505/051312098faf0032ced7af57190e62110e89f529.jpg" alt="3.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201505/051312098faf0032ced7af57190e62110e89f529.jpg) 继续 [<img src="https://images.seebug.org/upload/201505/0513124536d61c3eeed5d11651b4b25ddd57c16a.jpg" alt="4.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201505/0513124536d61c3eeed5d11651b4b25ddd57c16a.jpg) [<img src="https://images.seebug.org/upload/201505/051313364ae346cfa15b3f26f446539642728c73.jpg" alt="5.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201505/051313364ae346cfa15b3f26f446539642728c73.jpg) [<img src="https://images.seebug.org/upload/201505/05131517d2c3832d170817985e02b73e29c9ded3.jpg" alt="6.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201505/05131517d2c3832d170817985e02b73e29c9ded3.jpg) 我们用余额支付 [<img src="https://images.seebug.org/upload/201505/0513155836ca23fa9e6a27afda242a4894478f08.jpg" alt="7.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201505/0513155836ca23fa9e6a27afda242a4894478f08.jpg) 支付成功了 ### 漏洞证明: 订单支付成功了 [<img src="https://images.seebug.org/upload/201505/051317027d7bb1b1e2b3798db262554be342219e.jpg" alt="8.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201505/051317027d7bb1b1e2b3798db262554be342219e.jpg) [<img src="https://images.seebug.org/upload/201505/05131750f73a7984291eb440374f3250df9913b9.jpg" alt="9.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201505/05131750f73a7984291eb440374f3250df9913b9.jpg) 我们来看下账户余额 [<img src="https://images.seebug.org/upload/201505/05131854dc3ae04ee77a85bb4f6832741bfe4466.jpg" alt="10.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201505/05131854dc3ae04ee77a85bb4f6832741bfe4466.jpg)