Executive Summary

Summary
Title CS-Cart v3.0.4 configured with PayPal Standard Payments design vulnerability
Informations
Name VU#583564 First vendor Publication 2013-02-22
Vendor VU-CERT Last vendor Modification 2013-02-22
Severity (Vendor) N/A Revision M

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:N/I:P/A:N)
Cvss Base Score 5 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Vulnerability Note VU#583564

CS-Cart v3.0.4 configured with PayPal Standard Payments design vulnerability

Original Release date: 22 Feb 2013 | Last revised: 22 Feb 2013

Overview

CS-Cart v3.0.4 and possibly other versions configured with PayPal Standard Payment is susceptible to a client-side attack that results in an attacker purchasing items without having to pay for them.

Description

It has been reported that CS-Cart v3.0.4 configured with PayPal Standard Payments contains a design flaw that allows an attacker to buy items without having to pay for them. The parameter for the merchant's PayPal email address is controlled on the client-side and not verified by the server. This allows an attacker to change the PayPal email address to one the attacker controls allowing the attacker to purchase items on a website but effectively pay themselves instead of the merchant. Manual verification of website orders with the PayPal transactions would need to be performed to detect this fraud.

Impact

An attacker can effectively purchase items without paying the merchant for them.

Solution

Update

The vendor has stated that this vulnerability has been addressed in CS-Cart version 3.0.6. They have also released the security patch for the older versions (3.0.x & 2.2.x).

Vendor Information (Learn More)

VendorStatusDate NotifiedDate Updated
CS-CartAffected24 Jan 201318 Feb 2013
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

GroupScoreVector
Base7.1AV:N/AC:M/Au:N/C:N/I:C/A:N
Temporal4.7E:U/RL:OF/RC:UC
Environmental1.3CDP:L/TD:L/CR:ND/IR:ND/AR:ND

References

  • https://www.cs-cart.com/overview.html

Credit

Thanks to Giancarlo Pellegrino Institute Eurecom and SAP Research for reporting this vulnerability.

This document was written by Michael Orlando.

Other Information

  • CVE IDs:CVE-2013-0118
  • Date Public:15 Feb 2013
  • Date First Published:22 Feb 2013
  • Date Last Updated:22 Feb 2013
  • Document Revision:11

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Original Source

Url : http://www.kb.cert.org/vuls/id/583564

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-16 Configuration

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 44

Nessus® Vulnerability Scanner

Date Description
2015-04-10 Name : The remote host is missing a Mac OS X update that fixes multiple security vul...
File : macosx_10_10_3.nasl - Type : ACT_GATHER_INFO
2015-04-10 Name : The remote host is missing a Mac OS X update that fixes multiple security vul...
File : macosx_SecUpd2015-004.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
2
Date Informations
2013-02-25 21:19:40
  • Multiple Updates
2013-02-24 13:23:21
  • Multiple Updates
2013-02-22 17:19:34
  • First insertion