First published: Fri Jan 13 2006(Updated: )
Dave Nielsen and Patrick Breitenbach PayPal Web Services (aka PHP Toolkit) 0.50, and possibly earlier versions, allows remote attackers to enter false payment entries into the log file via HTTP POST requests to ipn_success.php.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PayPal WPS ToolKit | <=0.50 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-0201 is classified as a medium severity vulnerability due to its potential to allow unauthorized payment logging.
To address CVE-2006-0201, upgrade to a version of PayPal PHP Toolkit that is newer than 0.50.
CVE-2006-0201 allows remote attackers to manipulate payment logs, which can lead to fraudulent entries.
CVE-2006-0201 affects PayPal PHP Toolkit version 0.50 and possibly earlier versions.
Yes, CVE-2006-0201 is a web-based vulnerability that involves HTTP POST requests.