{"id":4794,"date":"2023-06-15T09:33:54","date_gmt":"2023-06-15T09:33:54","guid":{"rendered":"https:\/\/afreeurl.com\/?p=4794"},"modified":"2023-06-15T09:33:54","modified_gmt":"2023-06-15T09:33:54","slug":"vulnerability-in-the-woocommerce-stripe-payment-gateway-plugin-affects-more-than-900000-websites","status":"publish","type":"post","link":"https:\/\/afreeurl.com\/?p=4794","title":{"rendered":"Vulnerability in the WooCommerce Stripe Payment Gateway plugin affects more than 900,000 websites"},"content":{"rendered":"<p><\/p>\n<p>It was discovered that the WooCommerce Stripe payment gateway plugin had a vulnerability that could allow an attacker to steal personally identifiable information (PII) from a store&#8217;s customer via the plugin.<\/p>\n<p>Security researchers warn that hackers do not need authentication to pull off the exploit, which received a high rating of 7.5 on a scale of 1 to 10.<\/p>\n<h2>WooCommerce Stripe Payment Gateway Plugin<\/h2>\n<p>The Stripe payment gateway plugin, developed by WooCommerce, Automattic, WooThemes and other partners, is installed on more than 900,000 websites.<\/p>\n<p>It offers an easy way for customers of WooCommerce stores to pay, with several different credit cards and without having to open an account.<\/p>\n<p>A Stripe account is automatically created upon purchase, providing customers with a frictionless e-commerce shopping experience.<\/p>\n<p>The plugin works through an application programming interface (API).<\/p>\n<p>An API is like a bridge between two pieces of software that allows the WooCommerce store to interact with the Stripe software to seamlessly process orders from the website to Stripe.<\/p>\n<h2>What is the WooCommerce Stripe plugin vulnerability?<\/h2>\n<p>Patchstack security researchers discovered the vulnerability and responsibly disclosed it to the relevant parties.<\/p>\n<p><strong>According to security researchers at Patchstack:<\/strong><\/p>\n<p>&#8220;This plugin suffers from an Unauthenticated Insecure Direct Object Reference (IDOR) vulnerability.<\/p>\n<p>This vulnerability allows any unauthenticated user to view PII data from any WooCommerce order, including email, username, and full address.&#8221;<\/p>\n<h2>WooCommerce Stripe plugin versions affected<\/h2>\n<p>The vulnerability affects versions earlier and equal to version 7.4.0.<\/p>\n<p>The developers associated with the plugin have updated it to version 7.4.1, which is the most secure version.<\/p>\n<p><strong>These were the security updates made, according to the official plugin <a href=\"https:\/\/wordpress.org\/plugins\/woocommerce-gateway-stripe\/#developers\" target=\"_blank\" rel=\"noopener\">change log<\/a>:<\/strong><\/p>\n<p>&#8220;Fix: Add order key validation. Fix: Add sanitization and escape from some outputs.&#8221;<\/p>\n<p>There are a couple of issues that needed fixing.<\/p>\n<p>The first appears to be a lack of validation, which is generally a check to validate that a request is from an authorized entity.<\/p>\n<p>Next is sanitization, which refers to a process of blocking any input that is not valid.  For example, if an entry only allows text, it should be set to prohibit loading scripts.<\/p>\n<p>What the changelog mentions is escaping exits, which is a way to block unwanted and malicious entries.<\/p>\n<p><strong>The non-profit security organization, Open Worldwide Application Security Project (OWASP) <a href=\"https:\/\/owasp.org\/www-project-proactive-controls\/v3\/en\/c4-encode-escape-data\" target=\"_blank\" rel=\"noopener\">explains it like this<\/a>:<\/strong><\/p>\n<p>&#8220;Encoding and escaping are defensive techniques intended to stop injection attacks.&#8221;<\/p>\n<p><strong>The official WordPress API manual <a href=\"https:\/\/developer.wordpress.org\/apis\/security\/escaping\/\" target=\"_blank\" rel=\"noopener\">explains it this way<\/a>:<\/strong><\/p>\n<p>&#8220;Output escaping is the process of securing output data by removing unwanted data such as HTML tags or malformed script.<\/p>\n<p>This process helps protect your data before rendering it to the end user.&#8221;<\/p>\n<p>It is highly recommended that users of the plugin immediately update their plugins to version 7.4.1<\/p>\n<p><strong>Read the Security Notice on Patchstack:<\/strong><\/p>\n<p><a href=\"https:\/\/patchstack.com\/articles\/unauthenticated-idor-to-pii-disclosure-vulnerability-in-woocommerce-stripe-gateway-plugin\" target=\"_blank\" rel=\"noopener\">Disclosure of IDOR to unauthenticated PII in the WooCommerce Stripe Gateway plugin<\/a><\/p>\n<p>Featured image by Shutterstock\/FedorAnisimov<\/p>\n<p>[ad_2]<br \/>\n<br \/><a href=\"https:\/\/www.searchenginejournal.com\/vulnerability-in-woocommerce-stripe-payment-gateway-plugin-affects-900000-websites\/489427\/\" target=\"_blank\" rel=\"noopener\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>It was discovered that the WooCommerce Stripe payment gateway plugin had a vulnerability that could allow an attacker to steal personally identifiable information (PII) from a store&#8217;s customer via the plugin. Security researchers warn that hackers do not need authentication to pull off the exploit, which received a high rating of 7.5 on a scale of 1 to 10. WooCommerce Stripe Payment Gateway Plugin The Stripe payment gateway plugin, developed by WooCommerce, Automattic, WooThemes and&#8230; <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-4794","post","type-post","status-publish","format-standard","hentry","category-seo-news"],"_links":{"self":[{"href":"https:\/\/afreeurl.com\/index.php?rest_route=\/wp\/v2\/posts\/4794","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/afreeurl.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/afreeurl.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/afreeurl.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/afreeurl.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=4794"}],"version-history":[{"count":0,"href":"https:\/\/afreeurl.com\/index.php?rest_route=\/wp\/v2\/posts\/4794\/revisions"}],"wp:attachment":[{"href":"https:\/\/afreeurl.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=4794"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/afreeurl.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=4794"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/afreeurl.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=4794"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}