Open nicolasddev opened 1 week ago
Hi @nicolasddev. Thank you for your report. To speed up processing of this issue, make sure that the issue is reproducible on the vanilla Magento instance following Steps to reproduce. To deploy vanilla Magento instance on our environment, Add a comment to the issue:
@magento give me 2.4-develop instance
- upcoming 2.4.x release@magento I am working on this
Join Magento Community Engineering Slack and ask your questions in #github channel. :warning: According to the Magento Contribution requirements, all issues must go through the Community Contributions Triage process. Community Contributions Triage is a public meeting. :clock10: You can find the schedule on the Magento Community Calendar page. :telephone_receiver: The triage of issues happens in the queue order. If you want to speed up the delivery of your contribution, join the Community Contributions Triage session to discuss the appropriate ticket.
Hi @engcom-Delta. Thank you for working on this issue. In order to make sure that issue has enough information and ready for development, please read and check the following instruction: :point_down:
Area: XXXXX
label to the ticket, indicating the functional areas it may be related to.2.4-develop
branch@magento give me 2.4-develop instance
to deploy test instance on Magento infrastructure. 2.4-develop
branch, please, add the label Reproduced on 2.4.x
.Issue: Confirmed
once verification is complete.
Preconditions and environment
Steps to reproduce
Attempting to place an order using the PayPal Bill Me Later payment method, without actually providing any payment information.
We were unable to reproduce this exploit during our testing.
Expected result
The order cannot be placed without providing valid payment information.
Actual result
The hacker is able to place an order without providing valid payment information.
Additional information
Although no offline payment method is enabled, hackers are successfully able to place orders without providing any payment information. This vulnerability has been abused multiple times and the paypal_express_bml payment method was used to place these orders. Since no offline payment method is enabled, the hacker would normally have to resort on carding attacks in order to bypass the checkout process without providing valid credit card information. However, with the reCAPTCHA protection in place, carding attacks would be limited to only a few attempts. Therefore, it appears that the hacker is using this method to work around the standard checkout process and place dummy orders.
All of these orders were placed from various IPV6 addresses and contained code injection patterns similar to those reported in the issue #39002.
It is worth noting that, aside from the fact that the registered payment method was paypal_express_bml, the payment information was completely missing.
Release note
No response
Triage and priority