Pax Technology PAXSTORE v7.0.8_20200511171508 and lower is affected by a token spoofing vulnerability. Each payment terminal has a session token (called X-Terminal-Token) to access the marketplace. This allows the store to identify the terminal and make available the applications distributed by its reseller. By intercepting HTTPS traffic from the application store, it is possible to collect the request responsible for assigning the X-Terminal-Token to the terminal, which makes it possible to craft an X-Terminal-Token pretending to be another device. An attacker can use this behavior to authenticate its own payment terminal in the application store through token impersonation.
References
Link | Resource |
---|---|
https://marketing.paxtechnology.com/about-pax | Product |
https://www.whatspos.com/ | Product |
https://blog.pridesec.com.br/p/4c972078-5f01-419e-8bea-cf31ff2e3670/ | Exploit Third Party Advisory |
Configurations
Information
Published : 2021-05-07 04:15
Updated : 2021-05-13 07:49
NVD link : CVE-2020-36128
Mitre link : CVE-2020-36128
JSON object : View
CWE
CWE-290
Authentication Bypass by Spoofing
Products Affected
paxtechnology
- paxstore