CVE-2022-29254 – silverstripe/silverstripe-omnipay
Package
Manager: composer
Name: silverstripe/silverstripe-omnipay
Vulnerable Version: >=0 <2.5.2 || >=3.0.0 <3.0.2 || >=3.1.0 <3.1.4 || >=3.2.0 <3.2.1
Severity
Level: Low
CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00272 pctl0.50325
Details
Failed payment recorded has completed in Silverstripe Omnipay ### Impact For a subset of Omnipay gateways (those that use intermediary states like `isNotification()` or `isRedirect()`), if the payment identifier or success URL is exposed it is possible for payments to be prematurely marked as completed without payment being taken. This is mitigated by the fact that most payment gateways hide this information from users, however some issuing banks offer flawed 3DSecure implementations that may inadvertently expose this data. ### Patches The following versions have been patched to fix this issue: - `2.5.2` - `3.0.2` - `3.1.4` - `3.2.1` ### Workarounds There are no known workarounds for this vulnerability. ### References N/A. ### For more information If you have any questions or comments about this advisory: * Email us at [security@silverstripe.org](mailto:security@silverstripe.org)
Metadata
Created: 2022-06-06T21:24:39Z
Modified: 2022-06-06T21:24:39Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/06/GHSA-48f2-m7jg-866x/GHSA-48f2-m7jg-866x.json
CWE IDs: ["CWE-436", "CWE-437"]
Alternative ID: GHSA-48f2-m7jg-866x
Finding: F184
Auto approve: 1