CVE-2007-4143
phpcoupon - Authenticated Privilege Escalation via Billing Parameter Manipulation
Title source: llmExploitation Summary
EIP tracks 1 public exploit for CVE-2007-4143. PoCs published by freeprotect.net.
AI-analyzed exploit summary This exploit describes a payment bypass vulnerability in phpCoupon by manipulating URI parameters to simulate successful PayPal transactions without actual payment. The attack involves crafting a specific URL with parameters like 'billing' and 'status' to exploit improper transaction validation.
Description
user.php in the Billing Control Panel in phpCoupon allows remote authenticated users to obtain Premium Member status, and possibly acquire free coupons, via a modified URL containing a certain billing parameter and REQ=auth, status=success, and custom=upgrade substrings, possibly related to PayPal transactions.
Exploits (1)
This exploit describes a payment bypass vulnerability in phpCoupon by manipulating URI parameters to simulate successful PayPal transactions without actual payment. The attack involves crafting a specific URL with parameters like 'billing' and 'status' to exploit improper transaction validation.