CWE
20
Advisory Published
Updated

CVE-2009-4771: Input Validation

First published: Tue Apr 20 2010(Updated: )

The PayPal Website Payments Standard functionality in the Ubercart module 5.x before 5.x-1.9 and 6.x before 6.x-2.1 for Drupal does not properly validate orders, which allows remote attackers to trigger unspecified "duplicate actions" via unknown vectors.

Credit: cve@mitre.org

Affected SoftwareAffected VersionHow to fix
Ubercart Ubercart=5.x-1.0
Ubercart Ubercart=5.x-1.0-alpha1
Ubercart Ubercart=5.x-1.0-alpha2
Ubercart Ubercart=5.x-1.0-alpha3
Ubercart Ubercart=5.x-1.0-alpha4
Ubercart Ubercart=5.x-1.0-alpha5
Ubercart Ubercart=5.x-1.0-alpha6
Ubercart Ubercart=5.x-1.0-alpha6b
Ubercart Ubercart=5.x-1.0-alpha6c
Ubercart Ubercart=5.x-1.0-alpha7
Ubercart Ubercart=5.x-1.0-alpha7b
Ubercart Ubercart=5.x-1.0-alpha7c
Ubercart Ubercart=5.x-1.0-alpha7d
Ubercart Ubercart=5.x-1.0-alpha7e
Ubercart Ubercart=5.x-1.0-alpha8
Ubercart Ubercart=5.x-1.0-beta1
Ubercart Ubercart=5.x-1.0-beta2
Ubercart Ubercart=5.x-1.0-beta3
Ubercart Ubercart=5.x-1.0-beta4
Ubercart Ubercart=5.x-1.0-beta5
Ubercart Ubercart=5.x-1.0-beta6
Ubercart Ubercart=5.x-1.0-beta7
Ubercart Ubercart=5.x-1.0-rc1
Ubercart Ubercart=5.x-1.0-rc2
Ubercart Ubercart=5.x-1.0-rc3
Ubercart Ubercart=5.x-1.0-rc4
Ubercart Ubercart=5.x-1.0-rc5
Ubercart Ubercart=5.x-1.1
Ubercart Ubercart=5.x-1.2
Ubercart Ubercart=5.x-1.3
Ubercart Ubercart=5.x-1.3-rc1
Ubercart Ubercart=5.x-1.4
Ubercart Ubercart=5.x-1.5
Ubercart Ubercart=5.x-1.6
Ubercart Ubercart=5.x-1.7
Ubercart Ubercart=5.x-1.8
Ubercart Ubercart=6.x-2.0
Ubercart Ubercart=6.x-2.0-beta1
Ubercart Ubercart=6.x-2.0-beta2
Ubercart Ubercart=6.x-2.0-beta3
Ubercart Ubercart=6.x-2.0-beta4
Ubercart Ubercart=6.x-2.0-beta5
Ubercart Ubercart=6.x-2.0-beta6
Ubercart Ubercart=6.x-2.0-dev
Ubercart Ubercart=6.x-2.0-rc1
Ubercart Ubercart=6.x-2.0-rc2
Ubercart Ubercart=6.x-2.0-rc3
Ubercart Ubercart=6.x-2.0-rc4
Ubercart Ubercart=6.x-2.0-rc5
Ubercart Ubercart=6.x-2.0-rc6
Ubercart Ubercart=6.x-2.0-rc7
Drupal Drupal

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2009-4771?

    CVE-2009-4771 has a moderate severity level due to its potential to allow duplicate actions to be triggered by remote attackers.

  • How do I fix CVE-2009-4771?

    To fix CVE-2009-4771, you should update the Ubercart module to version 5.x-1.9 or 6.x-2.1 or later.

  • What versions of Ubercart are affected by CVE-2009-4771?

    CVE-2009-4771 affects Ubercart versions 5.x before 5.x-1.9 and 6.x before 6.x-2.1.

  • Who can exploit CVE-2009-4771?

    CVE-2009-4771 can be exploited by remote attackers with the ability to trigger duplicate order actions.

  • What component of Ubercart is vulnerable in CVE-2009-4771?

    The vulnerability in CVE-2009-4771 is found in the PayPal Website Payments Standard functionality of the Ubercart module.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203