alf.io is an open source ticket reservation system for conferences, trade shows, workshops, and meetups. Prior to version 2.0-M5, a race condition allows the user to bypass the limit on the number of promo codes and use the discount coupon multiple times. In "alf.io", an event organizer can apply price discounts by using promo codes to your events. The organizer can limit the number of promo codes that will be used for this, but the time-gap between checking the number of codes and restricting the use of the codes allows a threat actor to bypass the promo code limit. Version 2.0-M5 fixes this issue.
Metrics
Affected Vendors & Products
References
History
Fri, 06 Sep 2024 14:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Alf
Alf alf |
|
CPEs | cpe:2.3:a:alf:alf:*:*:*:*:*:*:*:* | |
Vendors & Products |
Alf
Alf alf |
|
Metrics |
ssvc
|
Fri, 06 Sep 2024 13:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | alf.io is an open source ticket reservation system for conferences, trade shows, workshops, and meetups. Prior to version 2.0-M5, a race condition allows the user to bypass the limit on the number of promo codes and use the discount coupon multiple times. In "alf.io", an event organizer can apply price discounts by using promo codes to your events. The organizer can limit the number of promo codes that will be used for this, but the time-gap between checking the number of codes and restricting the use of the codes allows a threat actor to bypass the promo code limit. Version 2.0-M5 fixes this issue. | |
Title | Bypassing promo code limitations with race conditions | |
Weaknesses | CWE-362 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-09-06T14:04:49.887Z
Reserved: 2024-08-26T18:25:35.443Z
Link: CVE-2024-45300

Updated: 2024-09-06T14:04:44.593Z

Status : Analyzed
Published: 2024-09-06T13:15:05.537
Modified: 2024-09-29T00:08:14.363
Link: CVE-2024-45300

No data.