DESIGNA ABACUS v.18 and before allows an attacker to bypass the payment process via a crafted QR code.

Posted by

[CVE]

CVE-2024-31802 

[Vulnerability]
The coupoum validation functionality allows a malicious user to guess and forge a valid QR code allowing no payments or discounts.

The Park Payment machines using QR codes encode the following structure to create the voucher ticket, alowing merchants to gift their customers with free parking or discounts:

The field “Valor” and QTD define the ticket credit value and how many times the ticket can be used. Changing the field “valor” tha attacker can add more money to his ticket, not paying for the parking time.

——————————————

[Exploit]

No public exploits available

——————————————

[Vendor]
DESIGNA

——————————————

[Affected Product Code Base]
DESIGNA ABACUS – Version Basic and Premium ( all versions), version >= 18

——————————————

[Attack Type]
Context-dependent

——————————————

[CVE Impact Other]
Validation bypass

——————————————

[Attack Vectors]
QR Code imputed to the system.

——————————————

[Discoverer]
Rodrigo Favarini

——————————————

[Reference]
http://designa.com