The Vulnerability Laboratory Research Team discovered persistent web vulnerability in the official Paypal (core) ecommerce website content management system.
The security flaw allows remote attackers to implement/inject own malicious script code on the application side (persistent).
Successful exploitation of the vulnerability results in persistent session hijacking (admin), account steal via persistent phishing or persistent search module web context manipulation.
In an email sent to EHN, The Vulnerability has submitted the proof-of-concept for the security flaw. You can find the poc code here : http://pastebin.com/LhB82k4F
The name with the code was saved in the addressbook. Only the matching and successful result leads to the persistent execution of the web context.
When the other user is searching the existing account of the addressbook the code will be executed persistent out of the matching search result web context listing.
Few months after the vulnerability notified the Paypal , Paypal security team has successfully patched the vulnerability on December 11.
0 comments: