magento / magento2

Prior to making any Submission(s), you must sign an Adobe Contributor License Agreement, available here at: https://opensource.adobe.com/cla.html. All Submissions you make to Adobe Inc. and its affiliates, assigns and subsidiaries (collectively “Adobe”) are subject to the terms of the Adobe Contributor License Agreement.
http://www.magento.com
Open Software License 3.0
11.47k stars 9.29k forks source link

Vulnerability Allowing Hacker to Bypass Checkout Process Using PayPal Bill Me Later Payment Method #39145

Open nicolasddev opened 1 week ago

nicolasddev commented 1 week ago

Preconditions and environment

Steps to reproduce

Attempting to place an order using the PayPal Bill Me Later payment method, without actually providing any payment information.

We were unable to reproduce this exploit during our testing.

Expected result

The order cannot be placed without providing valid payment information.

Actual result

The hacker is able to place an order without providing valid payment information.

Additional information

Although no offline payment method is enabled, hackers are successfully able to place orders without providing any payment information. This vulnerability has been abused multiple times and the paypal_express_bml payment method was used to place these orders. Since no offline payment method is enabled, the hacker would normally have to resort on carding attacks in order to bypass the checkout process without providing valid credit card information. However, with the reCAPTCHA protection in place, carding attacks would be limited to only a few attempts. Therefore, it appears that the hacker is using this method to work around the standard checkout process and place dummy orders.

All of these orders were placed from various IPV6 addresses and contained code injection patterns similar to those reported in the issue #39002.

It is worth noting that, aside from the fact that the registered payment method was paypal_express_bml, the payment information was completely missing.

Release note

No response

Triage and priority

m2-assistant[bot] commented 1 week ago

Hi @nicolasddev. Thank you for your report. To speed up processing of this issue, make sure that the issue is reproducible on the vanilla Magento instance following Steps to reproduce. To deploy vanilla Magento instance on our environment, Add a comment to the issue:

m2-assistant[bot] commented 6 days ago

Hi @engcom-Delta. Thank you for working on this issue. In order to make sure that issue has enough information and ready for development, please read and check the following instruction: :point_down: