Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-50968: n/a

0
High
VulnerabilityCVE-2024-50968cvecve-2024-50968
Published: Thu Nov 14 2024 (11/14/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

A business logic vulnerability exists in the Add to Cart function of itsourcecode Agri-Trading Online Shopping System 1.0, which allows remote attackers to manipulate the quant parameter when adding a product to the cart. By setting the quantity value to -0, an attacker can exploit a flaw in the application's total price calculation logic. This vulnerability causes the total price to be reduced to zero, allowing the attacker to add items to the cart and proceed to checkout.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 02:37:38 UTC

Technical Analysis

CVE-2024-50968 is a high-severity business logic vulnerability affecting the Add to Cart functionality in the itsourcecode Agri-Trading Online Shopping System version 1.0. The vulnerability arises from improper validation and handling of the 'quant' parameter, which specifies the quantity of a product added to the shopping cart. By submitting a manipulated quantity value of '-0', an attacker exploits a flaw in the system's total price calculation logic that erroneously reduces the total price to zero. This allows the attacker to add products to the cart and proceed through the checkout process without paying, effectively bypassing payment controls. The vulnerability is remotely exploitable without any authentication or user interaction, increasing its risk profile. The flaw impacts the integrity of the transaction process by enabling unauthorized free purchases, potentially leading to significant financial losses. The vulnerability does not affect confidentiality or availability directly. Although no public exploits have been reported yet, the simplicity of the attack vector and the critical business impact make this a serious threat. No patches or updates have been released at the time of publication, requiring organizations to implement interim mitigations. This vulnerability highlights the importance of robust input validation and secure business logic implementation in e-commerce platforms.

Potential Impact

The primary impact of CVE-2024-50968 is financial fraud due to unauthorized free purchases, which undermines the integrity of the e-commerce transaction process. Organizations operating the affected Agri-Trading Online Shopping System risk direct revenue loss as attackers can exploit the flaw to obtain goods without payment. This can also damage customer trust and brand reputation if exploited at scale. The vulnerability does not compromise customer data confidentiality or system availability, but the financial and operational consequences can be severe. Attackers can automate exploitation remotely without authentication, increasing the likelihood of widespread abuse. For businesses relying heavily on this platform, the vulnerability could disrupt normal sales operations and require costly incident response and remediation efforts. Additionally, if exploited by organized fraud rings, it could lead to significant inventory depletion and financial exposure. The lack of a patch increases the urgency for organizations to apply compensating controls to mitigate risk.

Mitigation Recommendations

To mitigate CVE-2024-50968, organizations should immediately implement strict input validation on the 'quant' parameter to reject negative, zero, or otherwise invalid quantity values before processing. Business logic should be revised to ensure that total price calculations cannot be manipulated by malformed inputs, including adding server-side checks that enforce minimum quantity constraints and verify total price consistency. Until an official patch is released, consider implementing web application firewall (WAF) rules to detect and block requests containing suspicious quantity values such as '-0'. Conduct thorough code reviews and testing of the checkout and cart modules to identify and fix similar logic flaws. Monitor transaction logs for anomalous patterns indicative of exploitation attempts, such as zero-value orders or unusual quantity inputs. Engage with the vendor or development team to prioritize a security patch and apply it promptly once available. Additionally, limit exposure by restricting access to the shopping system to trusted networks if feasible and educate staff on recognizing potential fraud indicators.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-10-28T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6ba4b7ef31ef0b55771a

Added to database: 2/25/2026, 9:37:40 PM

Last enriched: 2/28/2026, 2:37:38 AM

Last updated: 4/12/2026, 7:54:38 AM

Views: 18

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses