Hacking with OWASP WebGoat
Welcome to an episode on ethical hacking techniques using OWASP
WebGoat. We will explore a concurrency issue within a web application's
shopping cart logic. This vulnerability allows manipulation of transaction
values during checkout.
by Utulu Gift
, Understanding the Concurrency Issue
Business Logic Flaw Exploiting Checkout
The problem lies in how shopping cart information is updated. Specifically, the vulnerability occurs when checking out.
This allows hackers to change values during transactions. Attackers can alter the quantity of items.
Welcome to an episode on ethical hacking techniques using OWASP
WebGoat. We will explore a concurrency issue within a web application's
shopping cart logic. This vulnerability allows manipulation of transaction
values during checkout.
by Utulu Gift
, Understanding the Concurrency Issue
Business Logic Flaw Exploiting Checkout
The problem lies in how shopping cart information is updated. Specifically, the vulnerability occurs when checking out.
This allows hackers to change values during transactions. Attackers can alter the quantity of items.