First published: Wed Sep 19 2012(Updated: )
The PayPal (aka MODULE_PAYMENT_PAYPAL_STANDARD) module before 1.1 in osCommerce Online Merchant before 2.3.4 allows remote attackers to set the payment recipient via a modified value of the merchant's e-mail address, as demonstrated by setting the recipient to one's self.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
osCommerce PHP Point of Sale | <=2.3.3 | |
osCommerce PHP Point of Sale | =2.3.0 | |
osCommerce PHP Point of Sale | =2.3.1 | |
osCommerce PHP Point of Sale | =2.3.2 | |
PayPal Payments Standard | <=1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-2991 has been classified as a medium severity vulnerability due to its impact on payment functionality.
To fix CVE-2012-2991, upgrade the osCommerce Online Merchant to version 2.3.4 or newer.
CVE-2012-2991 affects users of the osCommerce Online Merchant versions prior to 2.3.4 using the PayPal Standard module.
Attackers can manipulate the payment recipient by altering the merchant's email address during transactions.
There is no specific patch; the issue is resolved through software upgrade to a non-vulnerable version.