CVE-2020-8818

An issue was discovered in the CardGate Payments plugin through 2.0.30 for Magento 2. Lack of origin authentication in the IPN callback processing function in Controller/Payment/Callback.php allows an attacker to remotely replace critical plugin settings (merchant ID, secret key, etc.) and therefore bypass the payment process (e.g., spoof an order status by manually sending an IPN callback request with a valid signature but without real payment) and/or receive all of the subsequent payments.
Configurations

Configuration 1 (hide)

cpe:2.3:a:cardgate:cardgate_payments:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:a:adobe:magento:2.3.4:*:*:*:*:*:*:*

History

21 Nov 2024, 05:39

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/156505/Magento-WooCommerce-CardGate-Payment-Gateway-2.0.30-Bypass.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/156505/Magento-WooCommerce-CardGate-Payment-Gateway-2.0.30-Bypass.html - Exploit, Third Party Advisory, VDB Entry
References () https://github.com/cardgate/magento2/blob/715979e54e1a335d78a8c5586f9e9987c3bf94fd/Controller/Payment/Callback.php#L88-L107 - Exploit, Third Party Advisory () https://github.com/cardgate/magento2/blob/715979e54e1a335d78a8c5586f9e9987c3bf94fd/Controller/Payment/Callback.php#L88-L107 - Exploit, Third Party Advisory
References () https://github.com/cardgate/magento2/issues/54 - Exploit, Third Party Advisory () https://github.com/cardgate/magento2/issues/54 - Exploit, Third Party Advisory

Information

Published : 2020-02-25 02:15

Updated : 2024-11-21 05:39


NVD link : CVE-2020-8818

Mitre link : CVE-2020-8818

CVE.ORG link : CVE-2020-8818


JSON object : View

Products Affected

cardgate

  • cardgate_payments

adobe

  • magento
CWE
CWE-346

Origin Validation Error