Loading HuntDB...

Order-phishing via Payment ID URL

Low
P
PortSwigger Web Security
Submitted None
Reported by sp1d3rs

Vulnerability Details

Technical details and impact analysis

Cross-Site Request Forgery (CSRF)
Hello. I discovered the endpoint, which allows the attacker conduct the fishing attack to other users and they can pay for attacker's order. Why this can happen? On the site, order id parameter sends to the https://portswigger.net/CCPayment.aspx as POST, but attacker can append it as GET and it will works: Example: https://portswigger.net/CCPayment.aspx?id=DD6BE85CDD50DC829C0354F83E5C67 Steps to reproduce: 1) Go to the https://portswigger.net/buy/ and fill the form. 2) Click "Confirm details". 3) Click "Pay by credit card". 4) Catch the POST request from ССpayment.aspx with order id: POST /CCPayment.aspx HTTP/1.1 [...Headers...] id=05BC4BF36F9BB32E80F4B581BF4859 5) Now append the id as GET parameter. You will have link like https://portswigger.net/CCPayment.aspx?id=05BC4BF36F9BB32E80F4B581BF4859 6) Now you can conduct phishing attack with this link, and users can pay for your order.

Report Details

Additional information and metadata

State

Closed

Substate

Informative

Submitted

Weakness

Cross-Site Request Forgery (CSRF)