Dave Nielsen and Patrick Breitenbach PayPal Web Services (aka PHP Toolkit) 0.50, and possibly earlier versions, allows remote attackers to enter false payment entries into the log file via HTTP POST requests to ipn_success.php.
References
Configurations
History
21 Nov 2024, 00:05
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/18444 - Vendor Advisory | |
References | () http://www.osvdb.org/22378 - | |
References | () http://www.securityfocus.com/archive/1/421739 - Vendor Advisory | |
References | () http://www.securityfocus.com/bid/16218 - | |
References | () http://www.uinc.ru/articles/vuln/ptpaypal050.shtml - Vendor Advisory | |
References | () http://www.vupen.com/english/advisories/2006/0183 - |
Information
Published : 2006-01-13 23:03
Updated : 2024-11-21 00:05
NVD link : CVE-2006-0201
Mitre link : CVE-2006-0201
CVE.ORG link : CVE-2006-0201
JSON object : View
Products Affected
paypal
- php_toolkit
CWE