paypal- PrestaShop module vulnerability (CVE-2024-41670)
Modulepaypal
Score
7.5 HighDate publish
26-07-2024Versiones afectadas
- Versions from 4.0.0 up to and including 6.4.1
- Up to and including 3.18.0
Description
In the module "PayPal Official" for PrestaShop 7+ releases prior to version 6.4.2 and for PrestaShop 1.6 releases prior to version 3.18.1, a malicious customer can confirm an order even if payment is finally declined by PayPal. A logical weakness during the capture of a payment in case of disabled webhooks can be exploited to create an accepted order. This could allow a threat actor to confirm an order with a fraudulent payment support. Versions 6.4.2 and 3.18.1 contain a patch for the issue. Additionally, users enable webhooks and check they are callable.References
Metrics
| cvssMetricV31 | |||||
|---|---|---|---|---|---|
| source | security-advisories@github.com | ||||
| type | Secondary | ||||
| version | 3.1 | ||||
| vectorString | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N | ||||
| baseScore | 7.5 | ||||
| baseSeverity | HIGH | ||||
| attackVector | NETWORK | ||||
| attackComplexity | LOW | ||||
| privilegesRequired | NONE | ||||
| userInteraction | NONE | ||||
| scope | UNCHANGED | ||||
| confidentialityImpact | NONE | ||||
| integrityImpact | HIGH | ||||
| availabilityImpact | NONE | ||||
| exploitabilityScore | 3.9 | ||||
| impactScore | 3.6 | ||||
