GHSA-VXPM-8HCP-QH27
Vulnerability from github – Published: 2023-02-03 21:07 – Updated: 2023-02-15 18:38
VLAI?
Summary
Payment information sent to PayPal not necessarily identical to created order
Details
Impact
If JavaScript-based PayPal checkout methods are used (PayPal Plus, Smart Payment Buttons, SEPA, Pay Later, Venmo, Credit card), the amount and item list sent to PayPal may not be identical to the one in the created order.
Patches
The problem has been fixed with version 5.4.4
Workarounds
Disable the aforementioned payment methods or use the Security Plugin in version >= 1.0.21.
References
Severity ?
7.5 (High)
{
"affected": [
{
"package": {
"ecosystem": "Packagist",
"name": "swag/paypal"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "5.4.4"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2023-23941"
],
"database_specific": {
"cwe_ids": [
"CWE-345"
],
"github_reviewed": true,
"github_reviewed_at": "2023-02-03T21:07:28Z",
"nvd_published_at": "2023-02-03T21:15:00Z",
"severity": "HIGH"
},
"details": "### Impact\nIf JavaScript-based PayPal checkout methods are used (PayPal Plus, Smart Payment Buttons, SEPA, Pay Later, Venmo, Credit card), the amount and item list sent to PayPal may not be identical to the one in the created order.\n\n### Patches\nThe problem has been fixed with version 5.4.4\n\n### Workarounds\nDisable the aforementioned payment methods or use the Security Plugin in version \u003e= 1.0.21.\n\n### References\n[Shopware blog post](https://news.shopware.com/security-issue-in-paypal-plugin-update-required)\n",
"id": "GHSA-vxpm-8hcp-qh27",
"modified": "2023-02-15T18:38:53Z",
"published": "2023-02-03T21:07:28Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/shopware/SwagPayPal/security/advisories/GHSA-vxpm-8hcp-qh27"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-23941"
},
{
"type": "WEB",
"url": "https://github.com/shopware/SwagPayPal/commit/57db5f4a57ef0a1646b509b415de9f03bf441b08"
},
{
"type": "PACKAGE",
"url": "https://github.com/shopware/SwagPayPal"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"type": "CVSS_V3"
}
],
"summary": "Payment information sent to PayPal not necessarily identical to created order"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…