Loading HuntDB...

Waketime Payment Gateway Vulnerability

High
W
WakaTime
Submitted None
Reported by normalguy46

Vulnerability Details

Technical details and impact analysis

Missing Encryption of Sensitive Data
Summary: Waketime's payment gateway does not encrypt data in transit, which could allow an attacker to intercept and capture card information. This vulnerability could be exploited by a man-in-the-middle (MITM) attack, in which the attacker would insert themselves between the user and the payment gateway, intercepting the data as it is transmitted. Steps to Reproduce: Visit the Waketime website. Proceed to subscribe and enter your credit card information. Observe that the data is not encrypted in transit. Expected Results: The data should be encrypted in transit, using a secure protocol. Actual Results: The data is not encrypted in transit, and could be intercepted by an attacker. ## Impact A man-in-the-middle attack is a type of cyberattack in which an attacker inserts themselves between two parties, intercepting and modifying the communication between them.

Report Details

Additional information and metadata

State

Closed

Substate

Spam

Submitted

Weakness

Missing Encryption of Sensitive Data