logo

CVE-2022-29254 silverstripe/silverstripe-omnipay

Package

Manager: composer
Name: silverstripe/silverstripe-omnipay
Vulnerable Version: >=0 <2.5.2 || >=3.0.0 <3.0.2 || >=3.1.0 <3.1.4 || >=3.2.0 <3.2.1

Severity

Level: Low

CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00272 pctl0.50325

Details

Failed payment recorded has completed in Silverstripe Omnipay ### Impact For a subset of Omnipay gateways (those that use intermediary states like `isNotification()` or `isRedirect()`), if the payment identifier or success URL is exposed it is possible for payments to be prematurely marked as completed without payment being taken. This is mitigated by the fact that most payment gateways hide this information from users, however some issuing banks offer flawed 3DSecure implementations that may inadvertently expose this data. ### Patches The following versions have been patched to fix this issue: - `2.5.2` - `3.0.2` - `3.1.4` - `3.2.1` ### Workarounds There are no known workarounds for this vulnerability. ### References N/A. ### For more information If you have any questions or comments about this advisory: * Email us at [security@silverstripe.org](mailto:security@silverstripe.org)

Metadata

Created: 2022-06-06T21:24:39Z
Modified: 2022-06-06T21:24:39Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/06/GHSA-48f2-m7jg-866x/GHSA-48f2-m7jg-866x.json
CWE IDs: ["CWE-436", "CWE-437"]
Alternative ID: GHSA-48f2-m7jg-866x
Finding: F184
Auto approve: 1