Payment Bypass in NAB Transact WooCommerce plugin for WordPress



Published: 2020-08-24
Risk Medium
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2020-11497
CWE-ID CWE-254
Exploitation vector Network
Public exploit Public exploit code for vulnerability #1 is available.
Vulnerable software
Subscribe
NAB Transact WooCommerce
Web applications / Modules and components for CMS

Vendor Tyson Armstrong

Security Bulletin

This security bulletin contains one medium risk vulnerability.

1) Security Features

EUVDB-ID: #VU45959

Risk: Medium

CVSSv3.1: 4.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C]

CVE-ID: CVE-2020-11497

CWE-ID: CWE-254 - Security Features

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise the target system.

The vulnerability exists due to the affected plugin does not validate the origin of payment processor status requests. A remote attacker can send a specially crafted request, mark any orders as fully paid and submit arbitrary transaction numbers into the payment records.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

NAB Transact WooCommerce: 2.1.0

External links

http://wpvulndb.com/vulnerabilities/10370/
http://www.themissinglink.com.au/security-advisories-cve-2020-11497


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.



###SIDEBAR###