BugForge - Daily - Cheesy Does It (Repeat)
BugForge - Daily - Cheesy Does It (Repeat)
Daily - Cheesy Does It (Repeat)
This is a repeat of the daily challenge from February 2nd, 2026.
Vulnerability Overview
A business logic flaw in the tip functionality of the Cheesy Does It pizza ordering application allows users to submit negative tip percentages during the checkout process. The payment validation endpoint (/api/payment/validate) and order creation endpoint (/api/orders) both accept negative values for the tip parameter without proper server-side validation. By manipulating the tip percentage to a negative value, an attacker can effectively receive credits instead of paying, resulting in unauthorized discounts or even profit from placing orders.
Key Issues:
- The tip parameter accepts negative values without server-side validation
- Both the payment validation and order creation endpoints are affected
- Financial parameters are trusted from the client rather than recalculated server-side
Vulnerabilities Covered
- Business Logic Flaw
- Insufficient Input Validation
Classification
- OWASP Top 10: A04:2021 - Insecure Design (lack of business logic validation)
- Vulnerability Type: Business Logic Flaw / Insufficient Input Validation
- Attack Surface: Payment validation (
/api/payment/validate) and order creation (/api/orders) endpoints - CWE: CWE-840 - Business Logic Errors, CWE-20 - Improper Input Validation
This post is licensed under CC BY 4.0 by the author.
