Security
Headlines
HeadlinesLatestCVEs

Headline

3DSecure 2.0 3DS Authorization Method Cross Site Request Forgery

A cross site request forgery vulnerability was identified in the Authorization Method of 3DSecure version 2.0, allowing attackers to submit unauthorized form data by modifying the HTTP Origin and Referer headers.

Packet Storm
#csrf#vulnerability#web#mac#auth
Product: 3DSecure 2.0Manufacturer: RedsysAffected Version(s): 3DSecure 2.0 3DS Authorization MethodTested Version(s): 3DSecure 2.0 3DS Authorization MethodVulnerability Type: Cross-Site Request Forgery (CSRF)Risk Level: MediumSolution Status: Not yet fixedManufacturer Notification: 2024-01-17Solution Date: N/APublic Disclosure: 2024-09-17CVE Reference: CVE-2024-25286Overview:A Cross-Site Request Forgery (CSRF) vulnerability was identified in the Authorization Method of 3DSecure 2.0, allowing attackers to submit unauthorized form data by modifying the HTTP Origin and Referer headers.Vulnerability Details:By altering the Origin and Referer headers, attackers can trick the server into processing unauthorized transactions.Solution:No solution is currently available. Redsys has been notified.References:OWASP Web Security Testing Guide: CSRFDiscoverer:Reported by Rubén López Herrera________________________________Este mensaje y sus adjuntos se dirigen exclusivamente a su destinatario, puede contener información privilegiada o confidencial y es para uso exclusivo de la persona o entidad de destino. Si no es usted. el destinatario indicado, queda notificado de que la lectura, utilización, divulgación y/o copia sin autorización puede estar prohibida en virtud de la legislación vigente. Si ha recibido este mensaje por error, le rogamos que nos lo comunique inmediatamente por esta misma vía y proceda a su destrucción.The information contained in this transmission is confidential and privileged information intended only for the use of the individual or entity named above. If the reader of this message is not the intended recipient, you are hereby notified that any dissemination, distribution or copying of this communication is strictly prohibited. If you have received this transmission in error, do not read it. Please immediately reply to the sender that you have received this communication in error and then delete it.Esta mensagem e seus anexos se dirigem exclusivamente ao seu destinatário, pode conter informação privilegiada ou confidencial e é para uso exclusivo da pessoa ou entidade de destino. Se não é vossa senhoria o destinatário indicado, fica notificado de que a leitura, utilização, divulgação e/ou cópia sem autorização pode estar proibida em virtude da legislação vigente. Se recebeu esta mensagem por erro, rogamos-lhe que nos o comunique imediatamente por esta mesma via e proceda a sua destruição

Packet Storm: Latest News

CUPS IPP Attributes LAN Remote Code Execution