The Vulnerability Laboratory Research Team discovered persistent web vulnerability in the official Paypal (core) ecommerce website content management system.
The security flaw allows remote attackers to implement/inject own malicious script code on the application side (persistent).
The persistent input validation vulnerability is located in the Adressbuch module with the bound vulnerable search function when processing to request script code tags as `Addressbuch` contacts. The code will be executed out of the search result listing web context. Remote exploitation requires low user interaction and a privileged paypal banking application user account.
Successful exploitation of the vulnerability results in persistent session hijacking (admin), account steal via persistent phishing or persistent search module web context manipulation.
In an email sent to EHN, The Vulnerability has submitted the proof-of-concept for the security flaw. You can find the poc code here : http://pastebin.com/LhB82k4F
The name with the code was saved in the addressbook. Only the matching and successful result leads to the persistent execution of the web context.
When the other user is searching the existing account of the addressbook the code will be executed persistent out of the matching search result web context listing.
Few months after the vulnerability notified the Paypal , Paypal security team has successfully patched the vulnerability on December 11.