Описание
An issue was discovered in the CardGate Payments plugin through 3.1.15 for WooCommerce. Lack of origin authentication in the IPN callback processing function in cardgate/cardgate.php allows an attacker to remotely replace critical plugin settings (merchant ID, secret key, etc.) and therefore bypass the payment process (e.g., spoof an order status by manually sending an IPN callback request with a valid signature but without real payment) and/or receive all of the subsequent payments.
Ссылки
- ExploitThird Party AdvisoryVDB Entry
- ExploitThird Party Advisory
- ExploitThird Party Advisory
- Third Party Advisory
- ExploitThird Party AdvisoryVDB Entry
- ExploitThird Party AdvisoryVDB Entry
- ExploitThird Party Advisory
- ExploitThird Party Advisory
- Third Party Advisory
- ExploitThird Party AdvisoryVDB Entry
Уязвимые конфигурации
Конфигурация 1Версия до 3.1.15 (включая)
cpe:2.3:a:cardgate:cardgate_payments:*:*:*:*:*:woocommerce:*:*
EPSS
Процентиль: 50%
0.00274
Низкий
8.1 High
CVSS3
5.5 Medium
CVSS2
Дефекты
CWE-346
Связанные уязвимости
CVSS3: 8.1
github
больше 3 лет назад
CardGate Payments plugin for WooCommerce does not validate request origin
EPSS
Процентиль: 50%
0.00274
Низкий
8.1 High
CVSS3
5.5 Medium
CVSS2
Дефекты
CWE-346