CVE-2018-19249

The Stripe API v1 allows remote attackers to bypass intended access restrictions by replaying api.stripe.com /v1/tokens XMLHttpRequest data, parsing the response under the object card{}, and reading the cvc_check information if the creation is successful without charging the actual card used in the transaction.
Configurations

Configuration 1 (hide)

cpe:2.3:a:stripe:stripe_api:1.0:*:*:*:*:*:*:*

History

21 Nov 2024, 03:57

Type Values Removed Values Added
References () https://fredmooredamian.blogspot.com/2019/01/improper-authentication-on-stripe-api-v1.html - Third Party Advisory () https://fredmooredamian.blogspot.com/2019/01/improper-authentication-on-stripe-api-v1.html - Third Party Advisory

Information

Published : 2019-01-03 22:29

Updated : 2024-11-21 03:57


NVD link : CVE-2018-19249

Mitre link : CVE-2018-19249

CVE.ORG link : CVE-2018-19249


JSON object : View

Products Affected

stripe

  • stripe_api
CWE
CWE-287

Improper Authentication