Dave Nielsen and Patrick Breitenbach PayPal Web Services (aka PHP Toolkit) 0.50, and possibly earlier versions, allows remote attackers to enter false payment entries into the log file via HTTP POST requests to ipn_success.php.
References
Link | Resource |
---|---|
http://www.securityfocus.com/archive/1/421739 | Vendor Advisory |
http://www.uinc.ru/articles/vuln/ptpaypal050.shtml | Vendor Advisory |
http://www.securityfocus.com/bid/16218 | |
http://secunia.com/advisories/18444 | Vendor Advisory |
http://www.osvdb.org/22378 | |
http://www.vupen.com/english/advisories/2006/0183 |
Configurations
Information
Published : 2006-01-13 15:03
Updated : 2011-03-07 18:29
NVD link : CVE-2006-0201
Mitre link : CVE-2006-0201
JSON object : View
CWE
Products Affected
paypal
- php_toolkit