Executive Summary

Summary
Title TomatoCart with PayPal Express Checkout design flaw vulnerability
Informations
Name VU#207540 First vendor Publication 2012-10-30
Vendor VU-CERT Last vendor Modification 2012-10-30
Severity (Vendor) N/A Revision M

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:S/C:N/I:P/A:N)
Cvss Base Score 3.5 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity Medium
Cvss Expoit Score 6.8 Authentication Requires single instance
Calculate full CVSS 2.0 Vectors scores

Detail

Vulnerability Note VU#207540

TomatoCart with PayPal Express Checkout design flaw vulnerability

Original Release date: 30 Oct 2012 | Last revised: 30 Oct 2012

Overview

TomatoCart 1.1.7 with PayPal Express Checkout, and possibly other versions, contains a design flaw that may allow an attacker to purchase items for free or less than advertised.

Description

It has been reported that TomatoCart 1.1.7 using the PayPal Express Checkout module in sandbox mode, and possibly other versions, suffers from a design flaw that may allow an attacker to purchase items for free or at a reduced price. An attacker may be able to manipulate the redirection URL from PayPal back to TomatoCart in a way that allows the attacker to purchase items for free or at a reduced price.

Impact

An attacker may be able to purchase items for free or at a reduced price.

Solution

We are currently unaware of a practical solution to this problem. Please consider the following workaround.

Disable PayPal Express

TomatoCart users should disable payments from the PayPal express checkout module until a patch is released.

Vendor Information (Learn More)

VendorStatusDate NotifiedDate Updated
tomatoCartAffected15 Oct 201229 Oct 2012
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

GroupScoreVector
Base6.8AV:N/AC:L/Au:S/C:N/I:C/A:N
Temporal5.5E:POC/RL:U/RC:UC
Environmental5.5CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND

References

  • http://tomatocart.com/
  • http://code.google.com/p/tomatocart-shoppingcart/downloads/detail?name=paypal_express.zip

Credit

Thanks to Giancarlo Pellegrino for reporting this vulnerability.

This document was written by Jared Allar.

Other Information

  • CVE IDs:CVE-2012-4934
  • Date Public:08 Oct 2012
  • Date First Published:30 Oct 2012
  • Date Last Updated:30 Oct 2012
  • Document Revision:13

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.


This product is provided subject to the Notification as indicated here: http://www.us-cert.gov/legal.html#notify

Original Source

Url : http://www.kb.cert.org/vuls/id/207540

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-264 Permissions, Privileges, and Access Controls

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 1