Executive Summary

Summary
Title osCommerce v2.3.1 with PayPal website payments standard module v1.0 design vulnerability
Informations
Name VU#459446 First vendor Publication 2012-09-18
Vendor VU-CERT Last vendor Modification 2012-09-18
Severity (Vendor) N/A Revision M

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:N/I:P/A:N)
Cvss Base Score 5 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Vulnerability Note VU#459446

osCommerce v2.3.1 with PayPal website payments standard module v1.0 design vulnerability

Original Release date: 18 Sep 2012 | Last revised: 18 Sep 2012

Overview

osCommerce 2.3.1 and possibly other versions with the PayPal website payments standard module is susceptible to a client-side attack that results in an attacker purchasing items without having to pay for them.

Description

It has been reported that osCommerce 2.3.1 using the PayPal website payments standard module 1.0 contains a design flaw that allows an attacker to buy items without having to pay for them. The parameter for the merchant's PayPal email address is controlled on the client-side and not verified by the server. This allows an attacker to change the PayPal email address to one the attacker controls allowing the attacker to purchase items on a website but effectively pay themselves instead of the merchant. Manual verification of website orders with the PayPal transactions would need to be performed to detect this fraud.

Impact

An attacker can effectively purchase items without paying the merchant for them.

Solution

Apply an Update

osCommerce Online Merchant v2.3.4 and v1.1 of the payment module will be released to address this issue. If you are unable to update, please consider the following workaround.

Enable Encrypted Web Payments in the payment module configuration.

Vendor Information (Learn More)

VendorStatusDate NotifiedDate Updated
osCommerceAffected18 Jul 201224 Aug 2012
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

GroupScoreVector
Base7.8AV:N/AC:L/Au:N/C:N/I:C/A:N
Temporal6.3E:POC/RL:U/RC:UC
Environmental6.3CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND

References

  • https://github.com/osCommerce/oscommerce2/tree/master/catalog/ext/modules/payment/paypal
  • http://oscommerce.com/
  • https://cms.paypal.com/cms_content/US/en_US/files/developer/IPNGuide.pdf

Credit

Thanks to Giancarlo Pellegrino of SAP Research for reporting this vulnerability.

This document was written by Jared Allar.

Other Information

  • CVE IDs:CVE-2012-2991
  • Date Public:17 Sep 2012
  • Date First Published:18 Sep 2012
  • Date Last Updated:18 Sep 2012
  • Document Revision:19

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.


This product is provided subject to the Notification as indicated here: http://www.us-cert.gov/legal.html#notify

Original Source

Url : http://www.kb.cert.org/vuls/id/459446

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 5