XSS marks the spot: PayPal portal peril plugged

  • 14 July 2014
  • 0 replies
  • 651 views

Userlevel 7
By John Leyden, 14 Jul 2014
 
PayPal has plugged a potentially nasty flaw on its internal portal.
The vulnerability, discovered by security analyst Benjamin Kunz Mejri of Vulnerability Laboratory, involved security shortcomings in PayPal's backend systems. More specifically, he said, it was an application-side filter bypass vulnerability in the official PayPal Ethernet portal backend application.
http://pubads.g.doubleclick.net/gampad/ad?iu=/6978/reg_security/front&sz=300x250%7C300x600&tile=3&c=33U8PV-qwQrMoAAGPHZKsAAAFK&t=ct%3Dns%26unitnum%3D3%26unitname%3Dwww_top_mpu%26pos%3Dtop%26test%3D0Before it was fixed, the flaw created a route for remote hackers to push malicious scripts onto PayPal's systems, as an advisory by the bug hunting team explains.
The filter bypass allows remote attackers to evade the regular parse and encode filter mechanism of the PayPal inc. online-service portal web-application. The persistent input validation vulnerability allows remote attackers to inject own malicious script codes on the application-side of the vulnerable service.
The Register/ full read here/ http://www.theregister.co.uk/2014/07/14/paypal_portal_peril_plugged/

0 replies

Be the first to reply!

Reply