Vulnerability Description
WebHybridClient.java in PayPal 5.3 and earlier for Android ignores SSL errors, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Paypal | Paypal | <= 5.3 |
Related Weaknesses (CWE)
References
- http://secunia.com/advisories/57351Third Party Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/92098Third Party AdvisoryVDB Entry
- https://labs.mwrinfosecurity.com/advisories/paypal-remote-code-execution/Third Party Advisory
- http://secunia.com/advisories/57351Third Party Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/92098Third Party AdvisoryVDB Entry
- https://labs.mwrinfosecurity.com/advisories/paypal-remote-code-execution/Third Party Advisory
FAQ
What is CVE-2013-7201?
CVE-2013-7201 is a vulnerability with a CVSS score of 7.4 (HIGH). WebHybridClient.java in PayPal 5.3 and earlier for Android ignores SSL errors, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information.
How severe is CVE-2013-7201?
CVE-2013-7201 has been rated HIGH with a CVSS base score of 7.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2013-7201?
Check the references section above for vendor advisories and patch information. Affected products include: Paypal Paypal.