We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-45300

Bypassing promo code limitations with race conditions



Description

alf.io is an open source ticket reservation system for conferences, trade shows, workshops, and meetups. Prior to version 2.0-M5, a race condition allows the user to bypass the limit on the number of promo codes and use the discount coupon multiple times. In "alf.io", an event organizer can apply price discounts by using promo codes to your events. The organizer can limit the number of promo codes that will be used for this, but the time-gap between checking the number of codes and restricting the use of the codes allows a threat actor to bypass the promo code limit. Version 2.0-M5 fixes this issue.

Reserved 2024-08-26 | Published 2024-09-06 | Updated 2024-09-06 | Assigner GitHub_M


HIGH: 7.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Problem types

CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

Product status

< 2.0-M5
affected

References

github.com/...alf.io/security/advisories/GHSA-67jg-m6f3-473g

github.com/...ommit/53b3309e26e8acec6860d1e045df3046153a3245

cve.org (CVE-2024-45300)

nvd.nist.gov (CVE-2024-45300)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-45300

Support options

Helpdesk Chat, Email, Knowledgebase
Telegram Chat
Subscribe to our newsletter to learn more about our work.