CVE-2024-39325

5.3 MEDIUM

📋 TL;DR

This vulnerability in Aimeos frontend controller allows improper payment status persistence after purchase completion. Attackers could potentially manipulate payment states to obtain goods without proper payment. All users of affected Aimeos versions are impacted.

💻 Affected Systems

Products:
  • aimeos/ai-controller-frontend
Versions: All versions prior to 2024.04.2, 2023.10.9, 2022.10.8, 2021.10.8, and 2020.10.15
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all Aimeos installations using the vulnerable frontend controller component.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could obtain products/services without payment by exploiting the persistent payment status, leading to financial loss and inventory discrepancies.

🟠

Likely Case

Unauthorized users might bypass payment verification to complete orders without actual payment processing.

🟢

If Mitigated

With proper monitoring and validation, unauthorized transactions could be detected and reversed before significant impact.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires understanding of Aimeos payment flow and basket management.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2024.04.2, 2023.10.9, 2022.10.8, 2021.10.8, or 2020.10.15 depending on your version line

Vendor Advisory: https://github.com/aimeos/ai-controller-frontend/commits/main

Restart Required: Yes

Instructions:

1. Identify your current Aimeos version. 2. Update to the corresponding patched version: 2024.04.2 (for 2024.x), 2023.10.9 (for 2023.x), 2022.10.8 (for 2022.x), 2021.10.8 (for 2021.x), or 2020.10.15 (for 2020.x). 3. Clear application cache. 4. Restart web server.

🔧 Temporary Workarounds

Manual basket cleanup

all

Implement custom middleware to reset payment status after each transaction

Implement custom controller logic to clear basket payment status post-purchase

🧯 If You Can't Patch

  • Implement additional payment verification at order fulfillment stage
  • Enable strict transaction logging and monitoring for payment status anomalies

🔍 How to Verify

Check if Vulnerable:

Check if your Aimeos version is older than the patched versions listed in the fix section

Check Version:

composer show aimeos/ai-controller-frontend

Verify Fix Applied:

Test purchase flow to ensure basket payment status resets properly after transaction completion

📡 Detection & Monitoring

Log Indicators:

  • Multiple successful purchases from same basket without new payment authorization
  • Payment status persisting across transactions

Network Indicators:

  • Unusual pattern of completed orders without corresponding payment gateway calls

SIEM Query:

Search for: 'basket payment status not reset' OR 'duplicate order without payment'

🔗 References

📤 Share & Export