You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Lack of origin authentication (CWE-346) at IPN callback processing function allow (even unauthorized) attacker to remotely replace critical plugin settings (merchant id, secret key etc) with known to him and therefore bypass payment process (eg. spoof order status by manually sending IPN callback request with a valid signature but without real payment) and/or receive all subsequent payments (on behalf of the store).
CardGate would like to thank Vladislav Svolsky @633kh4ck for pointing out this vulnerability to us and allowing us the time to implement a fix before this public disclosure.
Because we have also made changes on the gateway, it is no longer possible to exploit this vulnerability.
This also applies to all our extensions with versions <= 2.0.30, so all existing implementations are now no longer vulnerable.
The basic problem was located in a function to automatically configure the webshop plugin with the push of a button in the CardGate back office.
We would like to emphasise that this convenience functionality is now only supported for the latest plugin version and will not work for earlier versions.
CVE-2020-8818
Lack of origin authentication (CWE-346) at IPN callback processing function allow (even unauthorized) attacker to remotely replace critical plugin settings (merchant id, secret key etc) with known to him and therefore bypass payment process (eg. spoof order status by manually sending IPN callback request with a valid signature but without real payment) and/or receive all subsequent payments (on behalf of the store).
Vulnerable code (fixed in PR #53)
magento2/Controller/Payment/Callback.php
Lines 88 to 107 in 715979e
Affected versions: ≤ 2.0.30
Tested on: Magento 2.3.4 + CardGate Payment Gateway Module 2.0.30
Proof-of-Concept
The text was updated successfully, but these errors were encountered: