5 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:N/A:N
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
0.002 Low
EPSS
Percentile
57.2%
URL to the payment page done after checkout was created with autoincremented payment id (/pay-with-paypal/{id}
) and therefore it was easy to access for anyone, not even the order’s customer. The problem was, the Credit card form has prefilled “credit card holder” field with the Customer’s first and last name.
Additionally, the mentioned form did not require a 3D Secure authentication, as well as did not checked the result of the 3D Secure authentication.
The problem has been patched in Sylius/PayPalPlugin 1.2.4 and1.3.1
One can override a sylius_paypal_plugin_pay_with_paypal_form
route and change its URL parameters to (for example) {orderToken}/{paymentId}
, then override the Sylius\PayPalPlugin\Controller\PayWithPayPalFormAction
service, to operate on the payment taken from the repository by these 2 values. It would also require usage of custom repository method.
Additionally, one could override the @SyliusPayPalPlugin/payWithPaypal.html.twig
template, to add contingencies: ['SCA_ALWAYS']
line in hostedFields.submit(...)
function call (line 421). It would then have to be handled in the function callback.
If you have any questions or comments about this advisory:
CPE | Name | Operator | Version |
---|---|---|---|
sylius/paypal-plugin | lt | 1.3.1 | |
sylius/paypal-plugin | lt | 1.2.4 |
github.com/advisories/GHSA-25fx-mxc2-76g7
github.com/Sylius/PayPalPlugin/commit/2adc46be2764ccee22b4247139b8056fb8d1afff
github.com/Sylius/PayPalPlugin/commit/814923c2e9d97fe6279dcee866c34ced3d2fb7a7
github.com/Sylius/PayPalPlugin/security/advisories/GHSA-25fx-mxc2-76g7
nvd.nist.gov/vuln/detail/CVE-2021-41120
5 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:N/A:N
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
0.002 Low
EPSS
Percentile
57.2%