Miggo Logo

CVE-2021-41120: Sylius PayPal Plugin allows unauthorized access to Credit card form, exposing payer name and not requiring 3DS

7.5

CVSS Score
3.1

Basic Information

EPSS Score
0.57876%
Published
10/6/2021
Updated
1/27/2023
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
sylius/paypal-plugincomposer>= 1.0.0, < 1.2.41.2.4
sylius/paypal-plugincomposer>= 1.3.0, < 1.3.11.3.1

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

  1. The payment form route used predictable IDs without order token validation (Authorization Bypass via CWE-639), fixed by adding dual-parameter lookup in PayWithPayPalFormAction. 2. The Twig template's JavaScript integration lacked 3DS enforcement and result validation, allowing unauthenticated payments and PII exposure through prefilled names, addressed by adding contingencies parameter and authentication checks in the patch.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t URL to t** p*ym*nt p*** *on* **t*r ****kout w*s *r**t** wit* *utoin*r*m*nt** p*ym*nt i* (`/p*y-wit*-p*yp*l/{i*}`) *n* t**r**or* it w*s **sy to ****ss *or *nyon*, not *v*n t** or**r's *ustom*r. T** pro*l*m w*s, t** *r**it **r* *orm **s pr**

Reasoning

*. T** p*ym*nt *orm rout* us** pr**i*t**l* I*s wit*out or**r tok*n v*li**tion (*ut*oriz*tion *yp*ss vi* *W*-***), *ix** *y ***in* *u*l-p*r*m*t*r lookup in P*yWit*P*yP*l*orm**tion. *. T** Twi* t*mpl*t*'s J*v*S*ript int**r*tion l**k** **S *n*or**m*nt *