Pax Technology PAXSTORE v7.0.8_20200511171508 and lower is affected by incorrect access control that can lead to remote privilege escalation. PAXSTORE marketplace endpoints allow an authenticated user to read and write data not owned by them, including third-party users, application and payment terminals, where an attacker can impersonate any user which may lead to the unauthorized disclosure, modification, or destruction of information.
References
Link | Resource |
---|---|
https://blog.pridesec.com.br/p/4c972078-5f01-419e-8bea-cf31ff2e3670/ | Exploit Third Party Advisory |
https://marketing.paxtechnology.com/about-pax | Product |
https://www.whatspos.com/ | Product |
https://blog.pridesec.com.br/p/4c972078-5f01-419e-8bea-cf31ff2e3670/ | Exploit Third Party Advisory |
https://marketing.paxtechnology.com/about-pax | Product |
https://www.whatspos.com/ | Product |
Configurations
History
21 Nov 2024, 05:28
Type | Values Removed | Values Added |
---|---|---|
References | () https://blog.pridesec.com.br/p/4c972078-5f01-419e-8bea-cf31ff2e3670/ - Exploit, Third Party Advisory | |
References | () https://marketing.paxtechnology.com/about-pax - Product | |
References | () https://www.whatspos.com/ - Product |
Information
Published : 2021-05-07 11:15
Updated : 2024-11-21 05:28
NVD link : CVE-2020-36126
Mitre link : CVE-2020-36126
CVE.ORG link : CVE-2020-36126
JSON object : View
Products Affected
paxtechnology
- paxstore
CWE
CWE-639
Authorization Bypass Through User-Controlled Key