google-checkout-php-sample-code prior to 1.3.2 does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle malicious users to spoof SSL servers via an arbitrary valid certificate.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
google checkout-php 1.2.1 |
||
google checkout-php 1.2 |
||
google checkout-php |
||
google checkout-php 1.2.5a |
||
google checkout-php 1.3.0 |
||
google checkout-php 1.2.5 |