PayPal has just fixed a security vulnerability that could have been exploited to send malicious emails to users via its platform.Â Researchers atÂ security firm Vulnerability Lab haveÂ discoveredÂ a filter bypass and an application-side input validation vulnerability that allowed attackers to inject malicious code into emails sent by the PayPal platform.
â€śA persistent input validation & mail encoding web vulnerability has been discovered in the official PayPal Inc online-service web-application. The validation and mail encoding web vulnerabilityÂ allowsÂ remote attackers to inject own malicious script codes to the mail header of theÂ portal mails. â€ť states the postÂ publishedÂ by the Vulnerability Lab.
When PayPal users create a new account, they can link it to multiple email addresses. Each email address has to be confirmed by the users by providing a confirmation code sent to the account they want to confirm.
Unfortunately, an attacker could create an Â account and insert arbitrary HTML code in the account owner field.
The attack scenario is simple, the attacker links the new account to the victimâ€™s email and insert a malicious code in the account owner name. The platform then sends the aÂ confirmation email to that address of the victims, the message includes the malicious code that would get executed when the victims open the email.
The attack could be very insidious because the emails are sent from the legitimate PayPal platform through the account service[@]paypal.com, for this reason, the email is not detected as spam or malicious by the defense systems.
The above attack scenario could be exploited in phishing campaigns,Â session hijacking, and to redirect users to certain domains managed by the attackers.
Below a proof-of-concept video published by the experts at the Vulnerability Lab.
Vulnerability Lab reported the issue to PayPal in October 2015, the vulnerability has been fixed this month. The company awarded the researcherÂ Kunz Mejri fromÂ Vulnerability Lab withÂ $1,000.