Information Exposure Affecting sylius/paypal-plugin package, versions >=1.3.0, <1.3.1<1.2.4


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.19% (59th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-PHP-SYLIUSPAYPALPLUGIN-1728401
  • published6 Oct 2021
  • disclosed6 Oct 2021
  • creditUnknown

Introduced: 6 Oct 2021

CVE-2021-41120  (opens in a new tab)
CWE-200  (opens in a new tab)

How to fix?

Upgrade sylius/paypal-plugin to version 1.3.1, 1.2.4 or higher.

Overview

sylius/paypal-plugin is a PayPal plugin for Sylius.

Affected versions of this package are vulnerable to Information Exposure. The URL to the payment page done after checkout was created with auto-incremented payment id (/pay-with-paypal/{id}) and therefore it was easy to access for anyone, not even the order's customer. The problem is that the credit card form has a pre-filled credit card holder field with the customer's first and last name. Additionally, the mentioned form did not require a 3D Secure authentication.

CVSS Scores

version 3.1