vendor:
Paypal gateway Plugin
by:
Vikas Chaudhary
6.5
CVSS
MEDIUM
Parameter Tampering
798
CWE
Product Name: Paypal gateway Plugin
Affected Version From: 1.6.2008
Affected Version To: 1.6.2008
Patch Exists: YES
Related CWE: CVE-2019-7441
CPE: a:woocommerce:paypal_checkout_payment_gateway:1.6.8
Platforms Tested: Windows 10 - Firefox
2019
cgi-bin/webscr?cmd=_cart in the WooCommerce PayPal Checkout Payment Gateway plugin 1.6.8 for WordPress allows Parameter Tampering in an amount parameter (such as amount_1), as demonstrated by purchasing an item for lower than the intended price
The Web Parameter Tampering attack is based on the manipulation of parameters exchanged between client and server in order to modify application data, such as user credentials and permissions, price and quantity of products, etc. Usually, this information is stored in cookies, hidden form fields, or URL Query Strings, and is used to increase application functionality and control. This attack can be performed by a malicious user who wants to exploit the application for their own benefit, or an attacker who wishes to attack a third-person using a Man-in-the-middle attack. In both cases, tools likes Webscarab and Paros proxy are mostly used.
Mitigation:
Update to the latest version of the WooCommerce PayPal Checkout Payment Gateway plugin and ensure proper input validation and sanitization of parameters.