Lucene search

K
githubGitHub Advisory DatabaseGHSA-VXPM-8HCP-QH27
HistoryFeb 03, 2023 - 9:07 p.m.

Payment information sent to PayPal not necessarily identical to created order

2023-02-0321:07:28
CWE-345
GitHub Advisory Database
github.com
5
paypal
javascript-based
security plugin
shopware blog

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

0.001 Low

EPSS

Percentile

22.7%

Impact

If JavaScript-based PayPal checkout methods are used (PayPal Plus, Smart Payment Buttons, SEPA, Pay Later, Venmo, Credit card), the amount and item list sent to PayPal may not be identical to the one in the created order.

Patches

The problem has been fixed with version 5.4.4

Workarounds

Disable the aforementioned payment methods or use the Security Plugin in version >= 1.0.21.

References

Shopware blog post

Affected configurations

Vulners
Node
swagpaypalRange<5.4.4
CPENameOperatorVersion
swag/paypallt5.4.4

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

0.001 Low

EPSS

Percentile

22.7%

Related for GHSA-VXPM-8HCP-QH27