Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:paxtechnology:paxstore:*:*:*:*:*:*:*:*", "matchCriteriaId": "4189ECCE-FC22-42FF-B4DF-EB4119EE60D8", "versionEndIncluding": "7.0.8_20200511171508", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "Pax Technology PAXSTORE v7.0.8_20200511171508 and lower is affected by a token spoofing vulnerability. Each payment terminal has a session token (called X-Terminal-Token) to access the marketplace. This allows the store to identify the terminal and make available the applications distributed by its reseller. By intercepting HTTPS traffic from the application store, it is possible to collect the request responsible for assigning the X-Terminal-Token to the terminal, which makes it possible to craft an X-Terminal-Token pretending to be another device. An attacker can use this behavior to authenticate its own payment terminal in the application store through token impersonation."}, {"lang": "es", "value": "Pax Technology PAXSTORE versiones v7.0.8_20200511171508 y anteriores, est\u00e1 afectada por una vulnerabilidad de suplantaci\u00f3n de token. Cada terminal de pago contiene un token de sesi\u00f3n (llamado X-Terminal-Token) para acceder al mercado. Esto permite a la tienda identificar el terminal y poner a disposici\u00f3n las aplicaciones distribuidas por su revendedor. Al interceptar el tr\u00e1fico HTTPS de la tienda de aplicaciones, es posible recopilar la petici\u00f3n responsable de asignar el X-Terminal-Token al terminal, lo que hace posible crear un X-Terminal-Token pretendiendo ser otro dispositivo. Un atacante puede utilizar este comportamiento para autenticar su propio terminal de pago en la tienda de aplicaciones mediante la suplantaci\u00f3n de token"}], "id": "CVE-2020-36128", "lastModified": "2024-11-21T05:28:46.280", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N", "version": "3.1"}, "exploitabilityScore": 3.9, "impactScore": 4.2, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2021-05-07T11:15:08.173", "references": [{"source": "cve@mitre.org", "tags": ["Exploit", "Third Party Advisory"], "url": "https://blog.pridesec.com.br/p/4c972078-5f01-419e-8bea-cf31ff2e3670/"}, {"source": "cve@mitre.org", "tags": ["Product"], "url": "https://marketing.paxtechnology.com/about-pax"}, {"source": "cve@mitre.org", "tags": ["Product"], "url": "https://www.whatspos.com/"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Third Party Advisory"], "url": "https://blog.pridesec.com.br/p/4c972078-5f01-419e-8bea-cf31ff2e3670/"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Product"], "url": "https://marketing.paxtechnology.com/about-pax"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Product"], "url": "https://www.whatspos.com/"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-290"}], "source": "nvd@nist.gov", "type": "Primary"}]}