GithubHelp home page GithubHelp logo

zongxr / supermarket Goto Github PK

View Code? Open in Web Editor NEW
1.9K 61.0 683.0 148.42 MB

设计精良的网上商城系统,包括前端、后端、数据库、负载均衡、数据库缓存、分库分表、读写分离、全文检索、消息队列等,使用SpringCloud框架,基于Java开发。该项目可部署到服务器上,不断完善中……

License: GNU Affero General Public License v3.0

Java 81.66% HTML 13.49% ASP.NET 0.29% Classic ASP 0.86% PHP 1.18% Dockerfile 0.13% Shell 0.72% Ruby 1.66%
spring mybatis jquery html5 springcloud springboot redis mysql springmvc mycat

supermarket's Introduction


访客数量 

supermarket's People

Contributors

sonofodinsdf avatar zongxr avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

supermarket's Issues

[security vulnerability] Arbitrary Cart Update Vulnerability

Recently, our team found an arbitrary cart update vulnerability in the latest version of the project.

The vulnerability logic is present in the file: https://github.com/GoogleLLP/SuperMarket/blob/master/cart/src/main/java/com/supermarket/cart/controller/CartController.java#L73. Access to the /manage/update API is unauthorized, allowing attackers to update the information of arbitrary cart via a crafted cart object.

image

To address this vulnerability, we recommend that developers implement access control policies to limit API access to privileged users and cart owners only.

[security vulnerability] Arbitrary Order Addition Vulnerability

Recently, our team found an arbitrary order addition vulnerability in the latest version of the project.

The vulnerability logic is present in the file: https://github.com/GoogleLLP/SuperMarket/blob/master/order/src/main/java/com/supermarket/order/controller/OrderController.java#L36. Access to the /manage/save API is unauthorized, allowing attackers to add orders as any user via a crafted order object.

image

To address this vulnerability, we strongly recommend that developers implement access control policies to limit the order addition operation.

[security vulnerability] Arbitrary Cart Deletion Vulnerability

Recently, our team found an arbitrary cart deletion vulnerability in the latest version of the project.

The vulnerability logic is present in the file: https://github.com/GoogleLLP/SuperMarket/blob/master/cart/src/main/java/com/supermarket/cart/controller/CartController.java#L96. Access to the /manage/delete API is unauthorized, allowing attackers to delete arbitrary cart via a crafted cart object.

image

To address this vulnerability, we recommend that developers implement access control policies to limit API access to privileged users and cart owners only.

[security vulnerability] Arbitrary Cart Details Access Vulnerability

Recently, our team found an arbitrary cart details access vulnerability in the latest version of the project.

The vulnerability logic is present in the file: https://github.com/GoogleLLP/SuperMarket/blob/master/cart/src/main/java/com/supermarket/cart/controller/CartController.java#L35.
image

Access to the /manage/query?userId= API is unauthorized, allowing attackers to manipulate the userId request parameter and access other users' cart details, potentially compromising user privacy data.

To address this vulnerability, we strongly recommend that developers implement access control policies to ensure that only privileged users or cart owners can access the information.

[security vulnerability] Arbitrary Order Deletion Vulnerability

Recently, our team found an arbitrary order deletion vulnerability in the latest version of the project.

The vulnerability logic is present in the file: https://github.com/GoogleLLP/SuperMarket/blob/master/order/src/main/java/com/supermarket/order/controller/OrderController.java#L74. Unauthorized access to the /manage/delete/{orderId} API enables attackers to manipulate the path variable orderId and delete orders belonging to other users.
image

To address this vulnerability, we strongly recommend that developers implement access control policies to ensure that only privileged users or the order owner are authorized to perform the delete operation.

[security vulnerability] Arbitrary Order Detail Access Vulnerability

Recently, our team found an arbitrary order detail access vulnerability in the latest version of the project.
The vulnerability logic is present in the file: https://github.com/GoogleLLP/SuperMarket/blob/master/order/src/main/java/com/supermarket/order/controller/OrderController.java#L59. Access to the /manage/query/{userId} API is unauthorized, allowing attackers to manipulate the path variable userId and access other users' order details, potentially compromising user privacy data.

image

To address this vulnerability, we strongly recommend that developers implement access control policies to ensure that only privileged users or the owner can access the order information.

[security vulnerability] Arbitrary Cart Addition Vulnerability

Recently, our team found an arbitrary cart addition vulnerability in the latest version of the project.

The vulnerability logic is present in the file: https://github.com/GoogleLLP/SuperMarket/blob/master/cart/src/main/java/com/supermarket/cart/controller/CartController.java#L50. Access to the /manage/save API is unauthorized, allowing attackers to add carts for any user via a crafted cart object.

image

To address this vulnerability, we recommend that developers implement access control policies to ensure that users can only add items to their own cart.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.