Kamis, 27 Agustus 2015

Critical PayPal XSS vulnerability left accounts open to attack

Critical PayPal XSS vulnerability left accounts open to attack - It's excellent news that Apple has moved to the seventh generation Intel Kaby Lake processors, we are also pleased to see new graphics cards. Performance is outstanding. The 15-inch MacBook Pro would still benefit from a few other pro features, a 4K display for one, 32GB RAM being another. Yet at the already high price point, Apple may well be saving us from staring down a £3,000+ buying decision. For now, this is the best MacBook Pro but it comes at a cost that alienates new users and with ports that will frustrate pro users. Before you rush out, well we have collected a lot of data from the field directly and from many other blogs so very complete his discussion here about Critical PayPal XSS vulnerability left accounts open to attack, on this blog we also have to provide the latest automotive information from all the brands associated with the automobile. ok please continue reading:

insecure_paypal
PayPal has patched a security vulnerability which could have been used by hackers to steal users' login details, as well as to access unencrypted credit card information. A cross site scripting bug was discovered by Egyptian 'vulnerabilities hunter' Ebrahim Hegazy -- ironically on PayPal's Secure Payments subdomain.
Hegazy found the Stored XSS Vulnerability on https://Securepayments.Paypal.com back in the middle of June, and was able to demonstrate how it could be exploited. More than two months later, PayPal has addressed the issue and plugged the security hole.
Describing himself as an 'ethical hacker', Hegazy reported his discovery to PayPal on 16 June. He found that it was possible to engineer an HTML page that intercepted data entered on a secure PayPal page and transmit it to another server as plain text. This information was then available for exploitation in whatever way the attacker saw fit. Worryingly, Hegazy says that it would be possible for all of this to happen invisibly in the background -- a victim could make a regular PayPal payment which would clear, but there could also be an extra payment made to the attacker.
The bug was reported through PayPal's bug bounty program, and Hegazy praised the company for responding to emails quickly. As well as ensuring that the security flaw was fixed, he also managed to bag himself PayPal's top bounty reward of $750 for his troubles.
If you're interested to see how the vulnerability worked, check out the video below where Hegazy explains it all:

Tidak ada komentar:

Posting Komentar