search menu icon-carat-right cmu-wordmark

CERT Coordination Center

TomatoCart with PayPal Express Checkout design flaw vulnerability

Vulnerability Note VU#207540

Original Release Date: 2012-10-30 | Last Revised: 2012-10-30

Overview

TomatoCart 1.1.7 with PayPal Express Checkout, and possibly other versions, contains a design flaw that may allow an attacker to purchase items for free or less than advertised.

Description

It has been reported that TomatoCart 1.1.7 using the PayPal Express Checkout module in sandbox mode, and possibly other versions, suffers from a design flaw that may allow an attacker to purchase items for free or at a reduced price. An attacker may be able to manipulate the redirection URL from PayPal back to TomatoCart in a way that allows the attacker to purchase items for free or at a reduced price.

Impact

An attacker may be able to purchase items for free or at a reduced price.

Solution

We are currently unaware of a practical solution to this problem. Please consider the following workaround.

Disable PayPal Express

TomatoCart users should disable payments from the PayPal express checkout module until a patch is released.

Vendor Information

207540
 

tomatoCart Affected

Notified:  October 15, 2012 Updated: October 29, 2012

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.


CVSS Metrics

Group Score Vector
Base 6.8 AV:N/AC:L/Au:S/C:N/I:C/A:N
Temporal 5.5 E:POC/RL:U/RC:UC
Environmental 5.5 CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND

References

Acknowledgements

Thanks to Giancarlo Pellegrino for reporting this vulnerability.

This document was written by Jared Allar.

Other Information

CVE IDs: CVE-2012-4934
Date Public: 2012-10-08
Date First Published: 2012-10-30
Date Last Updated: 2012-10-30 15:15 UTC
Document Revision: 14

Sponsored by CISA.