Lucene search

K
nodejsMartin AngelovNODEJS:26
HistoryOct 17, 2015 - 7:41 p.m.

Validation Bypass

2015-10-1719:41:46
Martin Angelov
www.npmjs.com
19

0.001 Low

EPSS

Percentile

51.1%

Overview

Versions 2.x.x and earlier of paypal-ipn are affected by a validation bypass vulnerability.

paypal-ipn uses the test_ipn parameter (which is set by the PayPal IPN simulator) to determine if it should use the production PayPal site or the sandbox.

A motivated attacker could craft a request string using the simulator to fool the application into entering the sandbox mode, potentially allowing purchases without valid payment.

Recommendation

Upgrade to version 3.0.0 or later.

References

CPENameOperatorVersion
paypal-ipnlt3.0.0

0.001 Low

EPSS

Percentile

51.1%