IDOR in Purchase Order Cancellation Allows Unauthorized Users to Cancel Other Users’ POs
好的,我现在需要帮用户总结这篇文章的内容。用户的要求是用中文,控制在100字以内,不需要特定的开头,直接写描述。 首先,我得通读整篇文章,理解其主要内容。文章讲的是一个安全漏洞,叫做不安全的直接对象引用(IDOR),出现在某个服务端点。具体来说,攻击者可以通过替换PO ID来取消其他用户的采购订单。 接下来,我需要提取关键信息:漏洞类型、受影响的端点、攻击者如何利用漏洞、以及可能的影响。这些信息需要简洁明了地表达出来。 然后,我要确保总结控制在100字以内。可能需要精简语言,去掉不必要的细节。例如,“authenticated user”可以简化为“认证用户”。 最后,检查是否有遗漏的重要信息,并确保语句通顺、准确。 </think> 文章描述了一个不安全的直接对象引用漏洞存在于服务端点中,认证用户可通过替换采购订单ID取消他人订单,导致未经授权的业务逻辑滥用和潜在财务损失。 2026-3-15 15:47:44 Author: infosecwriteups.com(查看原文) 阅读量:3 收藏

Abu Idris Al-Muhaqqiq

Summary

An Insecure Direct Object Reference (IDOR) vulnerability exists in the Purchase Order cancellation endpoint at service-goauth.mokapos.com.
An authenticated user can cancel another user’s Purchase Order by replacing the PO ID in the cancellation request.

Get Abu Idris Al-Muhaqqiq’s stories in your inbox

Join Medium for free to get updates from this writer.

Remember me for faster sign in

The server does not verify ownership or authorization of the targeted PO resource.

Affected Endpoint

PUT /purchase-order/v1/ingredient-purchase-order/{PO_ID}/cancel

Users

  • User A — Victim
  • User B — Attacker

Steps to Reproduce

1. User A logs in to https://backoffice.mokapos.com
2. Navigate to INVENTORY Purchase Order (PO)
3. Create a new Purchase Order and note the PO ID
4. User B logs in to https://backoffice.mokapos.com
5. Navigate to INVENTORY Purchase Order (PO)
6. Create a PO
7. Open the PO detail page → Click More Cancel PO while intercepting the request
8. The following request is captured:

PUT /purchase-order/v1/ingredient-purchase-order/USER_B_PO_ID/cancel HTTP/2
Host: service-goauth.mokapos.com
Authorization: ATTACKER_TOKEN
Outlet-Id: 1141719
Content-Length: 0

9. Replace USER_B_PO_ID with User A’s PO ID
10. Send the modified request
11. Server responds with:

200 OK

12. When User A refreshes the page, the PO status changes from
Waiting for Fulfillment” → “Cancelled

Impact

  • Unauthorized cancellation of other users’ Purchase Orders
  • Business logic abuse and operational disruption
  • Potential financial loss due to cancelled procurement workflows

Timeline

February 5, 2026: Submit Report
February 5, 2026: Under Review
February 8, 2026: Out of Scope

Press enter or click to view image in full size


文章来源: https://infosecwriteups.com/idor-in-purchase-order-cancellation-allows-unauthorized-users-to-cancel-other-users-pos-bb9cbf4f7548?source=rss----7b722bfd1b8d---4
如有侵权请联系:admin#unsafe.sh