A security researcher claims to have discovered an unpatched vulnerability in the PayPal money transfer service that could allow attackers to trick victims into unknowingly completing attacker-directed transactions with a single click.
Clickjacking, also called UI redressing, refers to a technique wherein an unwitting user is tricked into clicking seemingly innocuous webpage elements like buttons with the goal of downloading malware, redirecting to malicious websites, or disclosing sensitive information.
This is typically achieved by displaying an invisible page or HTML element on top of the visible page, resulting in a scenario where users are fooled into thinking that they are clicking the legitimate page when they are in fact clicking the rogue element overlaid atop it.
“Thus, the attacker is ‘hijacking’ clicks meant for [the legitimate] page and routing them to another page, most likely owned by another application, domain, or both,” security researcher h4x0r_dz wrote in a post documenting the findings.
h4x0r_dz, who discovered the issue on the “www. paypal[.]com/agreements/approve” endpoint, said the issue was reported to the company in October 2021.
“This endpoint is designed for Billing Agreements and it should accept only billingAgreementToken,” the researcher explained. “But during my deep testing, I found that we can pass another token type, and this leads to stealing money from [a] victim’s PayPal account.”
This means that an adversary could embed the aforementioned endpoint inside an iframe, causing a victim already logged in to a web browser to transfer funds to an attacker-controlled PayPal account simply at the click of a button.
Even more concerningly, the attack could have had disastrous consequences on online portals that integrate with PayPal for checkouts, enabling the malicious actor to deduct arbitrary amounts from users’ PayPal accounts.
“There are online services that let you add balance using PayPal to your account,” h4x0r_dz said. “I can use the same exploit and force the user to add money to my account, or I can exploit this bug and let the victim create/pay Netflix account for me!”
(Update: The story has been rectified to mention that the bug is still unpatched and that the security researcher was not awarded any bug bounty for reporting the issue. The error is regretted. We have also reached out to PayPal for more details.) Read more: https://bit.ly/3lCQenG
You can also read this: Modern “Smart” Farm Machinery Vulnerable to Cyber-Attackers