[Security-news] Mollie for Drupal - Moderately critical - Faulty payment confirmation logic - SA-CONTRIB-2023-052
security-news at drupal.org
security-news at drupal.org
Wed Nov 15 17:19:16 UTC 2023
View online: https://www.drupal.org/sa-contrib-2023-052
Project: Mollie for Drupal [1]
Date: 2023-November-15
Security risk: *Moderately critical* 12∕25
AC:Complex/A:None/CI:None/II:Some/E:Theoretical/TD:All [2]
Vulnerability: Faulty payment confirmation logic
Affected versions: <2.2.1
Description:
This module enables you to pay online via Mollie.
The module might not properly load the correct order to update the payment
status when Mollie redirects to the redirect URL. This can allow an attacker
to apply other people's orders to their own, getting credit without paying.
This vulnerability is mitigated by the fact that an attacker must have some
knowledge about the module's internal functionality. The issue only affects
installations that use the Mollie for Drupal Commerce submodule.
Solution:
Install the latest version:
* If you use the Mollie for Drupal module, upgrade to Mollie for Drupal
2.2.1 [3].
Reported By:
* Rico Van de Vin [4]
* Norbert Arends [5]
Fixed By:
* Rico Van de Vin [6]
* hoporr [7]
* Norbert Arends [8]
Coordinated By:
* Greg Knaddison [9] of the Drupal Security Team
* xjm [10] of the Drupal Security Team
[1] https://www.drupal.org/project/mollie
[2] https://www.drupal.org/security-team/risk-levels
[3] https://www.drupal.org/project/mollie/releases/2.2.1
[4] https://www.drupal.org/user/1243726
[5] https://www.drupal.org/user/660798
[6] https://www.drupal.org/user/1243726
[7] https://www.drupal.org/user/444070
[8] https://www.drupal.org/user/660798
[9] https://www.drupal.org/user/36762
[10] https://www.drupal.org/u/xjm
More information about the Security-news
mailing list