Pax Technology PAXSTORE v7.0.8_20200511171508 and lower is affected by a token spoofing vulnerability. Each payment terminal has a session token (called X-Terminal-Token) to access the marketplace. This allows the store to identify the terminal and make available the applications distributed by its reseller. By intercepting HTTPS traffic from the application store, it is possible to collect the request responsible for assigning the X-Terminal-Token to the terminal, which makes it possible to craft an X-Terminal-Token pretending to be another device. An attacker can use this behavior to authenticate its own payment terminal in the application store through token impersonation.
References
Link | Resource |
---|---|
https://blog.pridesec.com.br/p/4c972078-5f01-419e-8bea-cf31ff2e3670/ | Exploit Third Party Advisory |
https://marketing.paxtechnology.com/about-pax | Product |
https://www.whatspos.com/ | Product |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2021-05-07T10:34:41
Updated: 2021-05-07T10:34:41
Reserved: 2021-01-04T00:00:00
Link: CVE-2020-36128
JSON object: View
NVD Information
Status : Analyzed
Published: 2021-05-07T11:15:08.173
Modified: 2021-05-13T14:49:08.153
Link: CVE-2020-36128
JSON object: View
Redhat Information
No data.
CWE