-
Notifications
You must be signed in to change notification settings - Fork 137
Closed
Description
Dear all!
I spent the last 6 months performing a formal security analysis of the current state of the Web Payment APIs as my Master's Thesis. You can find the report of the analysis attached to the issue.
Through that analysis 3 issues were observed.
- An attack that resulted out of a faulty implementation of the retry mechanism in Chrome/an ambiguous definition of the retry mechanism in the specs.
- A vulnerability that results out of the possibility to specify ambiguous information for a single payment method identifier in the methodData of a payment request. Especially since the spec does not imply what should happen in such a scenario (e.g. "last one wins" or "fails").
- A proposal of how to change the payment update event to prevent privacy issues concerning sending data to the merchant before payment intent was expressed.
I hope that especially the second point could be tackled in the spec. I worry that potential future named payment methods or future developments in general could otherwise introduce major attack vectors.
Have a nice day and stay healthy!
a_formal_security_analysis_of_the_web_payment_apis.pdf
marcoscaceres, adrianhopebailie and maxlgumarcoscaceresmarcoscaceresmarcoscaceres
Metadata
Metadata
Assignees
Labels
No labels