CVE-2020-36128

Pax Technology PAXSTORE v7.0.8_20200511171508 and lower is affected by a token spoofing vulnerability. Each payment terminal has a session token (called X-Terminal-Token) to access the marketplace. This allows the store to identify the terminal and make available the applications distributed by its reseller. By intercepting HTTPS traffic from the application store, it is possible to collect the request responsible for assigning the X-Terminal-Token to the terminal, which makes it possible to craft an X-Terminal-Token pretending to be another device. An attacker can use this behavior to authenticate its own payment terminal in the application store through token impersonation.
Configurations

Configuration 1 (hide)

cpe:2.3:a:paxtechnology:paxstore:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:28

Type Values Removed Values Added
References () https://blog.pridesec.com.br/p/4c972078-5f01-419e-8bea-cf31ff2e3670/ - Exploit, Third Party Advisory () https://blog.pridesec.com.br/p/4c972078-5f01-419e-8bea-cf31ff2e3670/ - Exploit, Third Party Advisory
References () https://marketing.paxtechnology.com/about-pax - Product () https://marketing.paxtechnology.com/about-pax - Product
References () https://www.whatspos.com/ - Product () https://www.whatspos.com/ - Product

Information

Published : 2021-05-07 11:15

Updated : 2024-11-21 05:28


NVD link : CVE-2020-36128

Mitre link : CVE-2020-36128

CVE.ORG link : CVE-2020-36128


JSON object : View

Products Affected

paxtechnology

  • paxstore
CWE
CWE-290

Authentication Bypass by Spoofing