Community Support Forums — WordPress® ( Users Helping Users ) — 2011-12-07T04:24:57-05:00 http://www.primothemes.com/forums/feed.php?f=4&t=15232 2011-12-07T04:24:57-05:00 http://www.primothemes.com/forums/viewtopic.php?t=15232&p=55955#p55955 <![CDATA[Re: ClickBank Button URL tampering]]>

Thanks Jason.

Statistics: Posted by pbradaric — December 7th, 2011, 4:24 am


]]>
2011-12-07T01:31:02-05:00 http://www.primothemes.com/forums/viewtopic.php?t=15232&p=55942#p55942 <![CDATA[Re: ClickBank Button URL tampering]]> s2Member v111206 and s2Member Pro v111206 ( Update )

  • ccBill® Buttons ( but to a far lesser degree, not as vulnerable ) ( fixed security vulnerability )
  • ClickBank® Buttons ( the most vulnerable in this regard ) ( fixed security vulnerability )
  • Google® Checkout Buttons ( also vulnerable ) ( fixed security vulnerability )
  • PayPal® Buttons ( only vulnerable when Button Encryption is disabled )
    ( with PayPal® Buttons, you can enable button encryption to prevent this, see: s2Member -> PayPal Options -> Account Details -> Button Encryption )

This security vulnerability was addressed in the release of s2Member and s2Member Pro v111206.
(s2Member/s2Member Pro) Security fix. A security vulnerability related to unsigned URLs leading to checkout pages for ccBill®, ClickBank® and Google® Checkout, has been addressed in this release. For further details, please see this thread.
The release of s2Member and s2Member Pro v111206 closes this vulnerability for all Payment Gateways integrated with s2Member. Please note however, that with PayPal Standard Button integration, you MUST still enable PayPal Button Encryption to close this vulnerability on your installation.

With PayPal® Buttons, you can enable button encryption here:
s2Member -> PayPal Options -> Account Details -> Button Encryption.

This security vulnerability does NOT affect these Payment Gateway integrations:
  • PayPal Pro Forms ( available with s2Member Pro )
  • Authorize.Net Pro Forms ( available with s2Member Pro )

Statistics: Posted by Jason Caldwell — December 7th, 2011, 1:31 am


]]>
2011-09-27T13:22:11-05:00 http://www.primothemes.com/forums/viewtopic.php?t=15232&p=41707#p41707 <![CDATA[Re: ClickBank Button URL tampering]]> Thanks for reporting this important issue.
~ and thanks for the heads up Cristián.

Yes, this is an issue that needs to be addressed. In the latest versions of s2Member we've introduced URL-signing functionality, which will be completed and integrated into ClickBank® very soon. Once that's completed, this vulnerability will no longer exist. In the mean time, you are correct. Changing values in the s2_invoice parameter is possible.

This security vulnerability affects the following Payment Gateways integrated with s2Member:
  • ccBill® Buttons ( but to a far lesser degree, not as vulnerable )
  • ClickBank® Buttons ( the most vulnerable in this regard )
  • Google® Checkout Buttons ( also vulnerable )
  • PayPal® Buttons ( but only when button encyption is NOT used )
    ( with PayPal® Buttons, you can enable button encryption to prevent this, see: s2Member -> PayPal Options -> Account Details -> Button Encryption )
This security vulnerability does NOT affect these Payment Gateway integrations:
  • PayPal Pro Forms ( available with s2Member Pro )
  • Authorize.Net Pro Forms ( available with s2Member Pro )

Statistics: Posted by Jason Caldwell — September 27th, 2011, 1:22 pm


]]>
2011-09-26T03:29:51-05:00 http://www.primothemes.com/forums/viewtopic.php?t=15232&p=39197#p39197 <![CDATA[Re: ClickBank Button URL tampering]]>
Yes, well, actually, the problem is that the user then has access to all of the products! I think this is pretty big deal.
Also, I see no problem with encrypting the whole attributes part of the URL - all the attributes in the purchase URL are "pass through" attributes (service is returning them to the "Thank You Page" unaltered). Also, you could use that "Security Encryption Key" (that s2Member already uses) to encrypt this data.

Best regards,
Pedja

Statistics: Posted by pbradaric — September 26th, 2011, 3:29 am


]]>
2011-09-25T17:22:26-05:00 http://www.primothemes.com/forums/viewtopic.php?t=15232&p=39118#p39118 <![CDATA[Re: ClickBank Button URL tampering]]>
We're looking at the possibility of encrypting the order buttons/URLs. PayPal already allows button encryption.

Statistics: Posted by Cristián Lávaque — September 25th, 2011, 5:22 pm


]]>
2011-09-24T12:26:07-05:00 http://www.primothemes.com/forums/viewtopic.php?t=15232&p=39014#p39014 <![CDATA[Re: ClickBank Button URL tampering]]>
I've confirmed my suspicions by performing a ClickBank test mode purchase. I've copied purchase button URL and added more custom capabilities and s2Member created new account with all custom capabilities I added "manually" to the purchase URL.
Now, the question is, how to protect ourselves against users who will try the same thing I did?

Best regards,
Pedja

Statistics: Posted by pbradaric — September 24th, 2011, 12:26 pm


]]>
2011-09-24T07:14:49-05:00 http://www.primothemes.com/forums/viewtopic.php?t=15232&p=38997#p38997 <![CDATA[Re: ClickBank Button URL tampering]]> Statistics: Posted by BlogPiG — September 24th, 2011, 7:14 am


]]>
2011-09-22T12:19:53-05:00 http://www.primothemes.com/forums/viewtopic.php?t=15232&p=38935#p38935 <![CDATA[Re: ClickBank Button URL tampering]]> I guess they must do as S2 holds no central data on products/access/capabilities for the IPN to call via an internal code.

I'm not a fan of WishList Member for various reasons but they use an ?sku=1234567 to call-back into the system as the product/level is stored. This can still be removed leaving you with an orphaned order in CB but no fraud can take place.

Amember goes even better and lets me associate the Clickbank product_id with an internal product number so no parameters are needed with the buy button at all. URL tampering is impossible.

Don't get me wrong both of these other solutions have some other major issues and S2 kicks their ass in many ways apart from this, which until I understand it better is a show stopper.

Can't wait to hear from the dev on this.

Statistics: Posted by BlogPiG — September 22nd, 2011, 12:19 pm


]]>
2011-09-22T11:27:06-05:00 http://www.primothemes.com/forums/viewtopic.php?t=15232&p=38931#p38931 <![CDATA[Re: ClickBank Button URL tampering]]>
Does this only affect click bank or does it affect all payment gateways?

Statistics: Posted by MODassic — September 22nd, 2011, 11:27 am


]]>
2011-09-22T10:30:33-05:00 http://www.primothemes.com/forums/viewtopic.php?t=15232&p=38926#p38926 <![CDATA[Re: ClickBank Button URL tampering]]>
Effectively he's saying customers can choose their access level by tweaking the payment URL!

Is this real?

Statistics: Posted by BlogPiG — September 22nd, 2011, 10:30 am


]]>
2011-09-20T22:15:06-05:00 http://www.primothemes.com/forums/viewtopic.php?t=15232&p=38847#p38847 <![CDATA[Re: ClickBank Button URL tampering]]> Statistics: Posted by Cristián Lávaque — September 20th, 2011, 10:15 pm


]]>
2011-09-20T16:09:15-05:00 http://www.primothemes.com/forums/viewtopic.php?t=15232&p=38754#p38754 <![CDATA[ClickBank Button URL tampering]]>
Let's say I have multiple ClickBank products (1,2,3,4) with different prices. In order to grant access to different product "pages" I use custom capabilities (as explained in these videos http://www.s2member.com/custom-capabilities-video/). Now, I need to generate a ClickBank buttons for each of these products (all for level 1).
For the sake of simplicity, let's say I have four "custom capabilities" (cap1, cap2, cap3, cap4). For product 1, I also specify "cap1" under "custom capabilities". For product 2, I specify "cap2" under "custom capabilities". The same goes for products 3 and 4.
Generated URLs have, among other pass-thru variables, this: "s2_invoice=1%3Acap1" (for product 1). For all other products, "s2_invoice" param has appropriate "capN" value.
Now, my concern is this. If "s2_invoice" param for product 1 is changed from this "s2_invoice=1%3Acap1" to this "s2_invoice=1%3Acap1%2Ccap2%2Ccap3%2Ccap4", wouldn't that user be granted access to other products as well? The thing is, anyone can change the request URL and buy a single product but gain access to all other products just by changing s2_invoice param value.

I hope i'm wrong.

Best regards,
Pedja

Statistics: Posted by pbradaric — September 20th, 2011, 4:09 pm


]]>