The Stripe API v1 allows remote attackers to bypass intended access restrictions by replaying api.stripe.com /v1/tokens XMLHttpRequest data, parsing the response under the object card{}, and reading the cvc_check information if the creation is successful without charging the actual card used in the transaction.
References
Link | Resource |
---|---|
https://fredmooredamian.blogspot.com/2019/01/improper-authentication-on-stripe-api-v1.html | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2019-01-03T22:00:00
Updated: 2019-01-03T21:57:01
Reserved: 2018-11-13T00:00:00
Link: CVE-2018-19249
JSON object: View
NVD Information
Status : Analyzed
Published: 2019-01-03T22:29:00.323
Modified: 2019-01-31T13:27:34.887
Link: CVE-2018-19249
JSON object: View
Redhat Information
No data.
CWE