Overview
TomatoCart 1.1.7 with PayPal Express Checkout, and possibly other versions, contains a design flaw that may allow an attacker to purchase items for free or less than advertised.
Description
It has been reported that TomatoCart 1.1.7 using the PayPal Express Checkout module in sandbox mode, and possibly other versions, suffers from a design flaw that may allow an attacker to purchase items for free or at a reduced price. An attacker may be able to manipulate the redirection URL from PayPal back to TomatoCart in a way that allows the attacker to purchase items for free or at a reduced price. |
Impact
An attacker may be able to purchase items for free or at a reduced price. |
Solution
We are currently unaware of a practical solution to this problem. Please consider the following workaround. |
Disable PayPal Express TomatoCart users should disable payments from the PayPal express checkout module until a patch is released. |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | 6.8 | AV:N/AC:L/Au:S/C:N/I:C/A:N |
Temporal | 5.5 | E:POC/RL:U/RC:UC |
Environmental | 5.5 | CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND |
References
Acknowledgements
Thanks to Giancarlo Pellegrino for reporting this vulnerability.
This document was written by Jared Allar.
Other Information
CVE IDs: | CVE-2012-4934 |
Date Public: | 2012-10-08 |
Date First Published: | 2012-10-30 |
Date Last Updated: | 2012-10-30 15:15 UTC |
Document Revision: | 14 |