phpCoupon - Remote Payment Bypass

Author: freeprotect.net
type: webapps
platform: php
port: 
date_added: 2007-07-28  
date_updated: 2013-12-23  
verified: 1  
codes: CVE-2007-4143;OSVDB-39027  
tags:   
aliases:   
screenshot_url:   
application_url:   

raw file: 30429.txt  
source: https://www.securityfocus.com/bid/25116/info

phpCoupon is prone to a remote payment-bypass vulnerability because the application fails to properly secure PayPal payment transactions.

Successfully exploiting this issue allows remote attackers to perform payment transactions in the application without actually paying money. This allows them to obtain services for free.

The following URI demonstrates this issue:

http://www.example.com/path/user.php?REQ=auth&billing=141&status=success&custom=upgrade5

The '141' and the 'upgrade5' values may vary from installation to installation.