Overview
NETELLER Direct Payment API version 4.1.6 and possibly earlier versions were reported to be vulnerable to parameter manipulation via a modified HTTP POST request. After further analysis and discussion with NETELLER, this report was found to be incorrect. The NETELLER Direct Payment API is not vulnerable to the reported parameter manipulation.
Description
NETELLER Direct Payment API version 4.1.6 was reported to be vulnerable to parameter manipulation through a modified HTTP POST request and URL redirection, which would allow a malicious user to purchase items without paying the merchant for them. After further analysis and discussion with NETELLER, the initial report was found to be incorrect. NETELLER Direct Payment API is not vulnerable to this attack. During a NETELLER Direct Payment API purchase transaction, the purchaser provides their NETELLER account number and PIN to the merchant, who then communicates with NETELLER to complete the transaction. The merchant could use the account number and PIN to make fraudulent transactions against the purchaser's account. Presumably, fraudulent transactions would be noticed by the purchaser and subject to investigation and possible termination of the merchant's account by NETELLER. |
Impact
As with most, if not all electronic payment systems, the purchaser needs to trust other parties with sensitive account and identity information. In this case, the merchant may be able to make fraudulent purchases against the purchaser's NETELLER account. |
Solution
NETELLER recommends following the Direct Payment API Integration documentation. |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | 0 | AV:N/AC:M/Au:S/C:N/I:N/A:N |
Temporal | 0 | E:POC/RL:ND/RC:C |
Environmental | 0 | CDP:N/TD:N/CR:ND/IR:ND/AR:ND |
References
Acknowledgements
Thanks to the reporter that wishes to remain anonymous.
This document was written by Adam Rauf.
Other Information
CVE IDs: | CVE-2013-3611 |
Date Public: | 2013-09-23 |
Date First Published: | 2013-09-23 |
Date Last Updated: | 2013-10-07 21:53 UTC |
Document Revision: | 23 |