Improper handling of payment callback allows topping up a Swiss Starbucks Card bypassing actual payment via a crafted success message
High
S
Starbucks
Submitted None
Team Summary
Official summary from Starbucks
khovansky uncovered that an attacker could register on https://xtras.starbucks.ch and utilizing that registration, subsequently generate a reset password email via https://card.starbucks.ch After resetting the password for the account, khovansky noticed this process auto generates a virtual Swiss Starbucks card. khovansky could then top up this virtual card without completing a transaction by forging a "payment successful" callback. @khovansky — thank you for reporting this vulnerability and your assistance confirming the resolution.
Actions:
Reported by
khovansky
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Submitted
Weakness
Business Logic Errors