Order-phishing via Payment ID URL

Disclosed: 2016-11-30 20:14:33 By sp1d3rs To portswigger
Low
Vulnerability Details
Hello. I discovered the endpoint, which allows the attacker conduct the fishing attack to other users and they can pay for attacker's order. Why this can happen? On the site, order id parameter sends to the https://portswigger.net/CCPayment.aspx as POST, but attacker can append it as GET and it will works: Example: https://portswigger.net/CCPayment.aspx?id=DD6BE85CDD50DC829C0354F83E5C67 Steps to reproduce: 1) Go to the https://portswigger.net/buy/ and fill the form. 2) Click "Confirm details". 3) Click "Pay by credit card". 4) Catch the POST request from ССpayment.aspx with order id: POST /CCPayment.aspx HTTP/1.1 [...Headers...] id=05BC4BF36F9BB32E80F4B581BF4859 5) Now append the id as GET parameter. You will have link like https://portswigger.net/CCPayment.aspx?id=05BC4BF36F9BB32E80F4B581BF4859 6) Now you can conduct phishing attack with this link, and users can pay for your order.
Actions
View on HackerOne
Report Stats
  • Report ID: 186862
  • State: Closed
  • Substate: informative
  • Upvotes: 6
Share this report