Recently, our team found an Arbitrary Address Access vulnerability in the latest version of the project.
The vulnerability logic is present in the file:https://gitee.com/qiguliuxing/dts-shop/blob/master/dts-wx-api/src/main/java/com/qiguliuxing/dts/wx/web/WxCartController.java#483.
The operation `com.qiguliuxing.dts.db.dao.DtsAddressMapper.selectByPrimaryKey()` is not protected by permission checks,
while the request of path is also unauthorized, which means an attacker can achieve Arbitrary Address Access.
To address this vulnerability, we strongly advise that developers implement access control policies that limit API access to admin users or the owner.
新值
Recently, our team found an Arbitrary Address Access vulnerability in the latest version of the project.
The vulnerability logic is present in the file:https://gitee.com/qiguliuxing/dts-shop/blob/master/dts-wx-api/src/main/java/com/qiguliuxing/dts/wx/web/WxCartController.java#487.