### [CVE-2019-18608](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18608) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description Cezerin v0.33.0 allows unauthorized order-information modification because certain internal attributes can be overwritten via a conflicting name when processing order requests. Hence, a malicious customer can manipulate an order (e.g., its payment status or shipping fee) by adding additional attributes to user-input during the PUT /ajax/cart operation for a checkout, because of getValidDocumentForUpdate in api/server/services/orders/orders.js. ### POC #### Reference - https://github.com/cl0udz/vulnerabilities/blob/master/cezerin-manipulate_order_information/README.md - https://github.com/cl0udz/vulnerabilities/blob/master/cezerin-manipulate_order_information/README.md #### Github No PoCs found on GitHub currently.