In the module "PayPal Official" for PrestaShop 7+ releases prior to version 6.4.2 and for PrestaShop 1.6 releases prior to version 3.18.1, a malicious customer can confirm an order even if payment is finally declined by PayPal. A logical weakness during the capture of a payment in case of disabled webhooks can be exploited to create an accepted order. This could allow a threat actor to confirm an order with a fraudulent payment support. Versions 6.4.2 and 3.18.1 contain a patch for the issue. Additionally, users enable webhooks and check they are callable.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2024-08-02T04:46:52.667Z

Reserved: 2024-07-18T15:21:47.485Z

Link: CVE-2024-41670

cve-icon Vulnrichment

Updated: 2024-08-02T04:46:52.667Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-07-26T15:15:11.053

Modified: 2024-11-21T09:32:56.577

Link: CVE-2024-41670

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.