“Day 22: The Race Condition Heist — How I Bought a $3,000 Drone for $0.01”
研究人员发现某电子产品零售商存在竞态条件漏洞,利用支付与库存检查间的微秒时间差,成功以极低价格购得已售罄的高价商品,并获得2500美元赏金。 2025-8-31 11:28:19 Author: infosecwriteups.com(查看原文) 阅读量:8 收藏

Exploiting the Microsecond Gap Between Payment and Inventory Check

Aman Sharma

The target was a high-traffic electronics retailer. Their checkout process was sleek and fast. Too fast. While testing, I noticed that when I added the last item in stock to my cart, the site would sometimes flicker between “In Stock” and “Out of Stock” if I spammed the “Add to Cart” button. That flicker was the hint. It represented a tiny gap — a few milliseconds — where the application’s logic was vulnerable. By weaponizing this gap with a carefully timed script, I was able to trick their system into letting me purchase a $3,000 drone after it was officially out of stock, paying only a fractional penny. This flaw, a race condition, earned a $2500 bounty.

free link

Press enter or click to view image in full size

What is a Race Condition?

In simple terms, a race condition occurs when the output of a process is unexpectedly dependent on the sequence or timing of other uncontrollable events. It’s like two threads (or processes) running a race, and the flawed outcome depends on who finishes first.

In web security, it often happens when:

  1. A system checks a condition (e.g., “Is there stock available?”).

文章来源: https://infosecwriteups.com/day-22-the-race-condition-heist-how-i-bought-a-3-000-drone-for-0-01-8cca7dc6c559?source=rss----7b722bfd1b8d---4
如有侵权请联系:admin#unsafe.sh