Description
paypal-ipn before 3.0.0 uses the `test_ipn` parameter (which is set by the PayPal IPN simulator) to determine if it should use the production PayPal site or the sandbox. With a bit of time, an attacker could craft a request using the simulator that would fool any application which does not explicitly check for test_ipn in production.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-0624 | paypal-ipn before 3.0.0 uses the `test_ipn` parameter (which is set by the PayPal IPN simulator) to determine if it should use the production PayPal site or the sandbox. With a bit of time, an attacker could craft a request using the simulator that would fool any application which does not explicitly check for test_ipn in production. |
Github GHSA |
GHSA-h698-r4hm-w94p | Validation Bypass in paypal-ipn |
References
History
No history.
Status: PUBLISHED
Assigner: hackerone
Published:
Updated: 2024-09-17T00:11:12.478Z
Reserved: 2017-10-29T00:00:00.000Z
Link: CVE-2014-10067
No data.
Status : Modified
Published: 2018-05-29T20:29:00.220
Modified: 2024-11-21T02:03:26.783
Link: CVE-2014-10067
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA