close ad
 
Important WebAssist Announcement
open ad
View Menu

Technical Support Forums

Free, outstanding support from WebAssist and your colleagues

rating

Poodle SSL 3 0 Vulnerability - all our transactions are failing as of this morning (PayPal Payments Pro)

Thread began 11/18/2014 4:10 pm by Nathon Jones Web Design | Last modified 11/19/2014 1:02 pm by Jason Byrnes | 1326 views | 5 replies |

Nathon Jones Web Design

Poodle SSL 3 0 Vulnerability - all our transactions are failing as of this morning (PayPal Payments Pro)

In case anyone else is having this problem, all of our transactions started failing this morning.

We contacted PayPal and Cardinal Commerce and Cardinal Commerce were first back in touch which the following information:
"We recently, this morning, disabled any incoming traffic that uses SSL v. 3.0 protocol due to the POODLE vulnerability. From a SSL certificate standpoint, can you confirm that you are not using SSL v. 3.0? You may need to check with your host server if you do not know."

On the PayPal website they seem to have some important information about the POODLE vulnerability:
https://ppmts.custhelp.com/app/answers/detail/a_id/1182

So I'm assuming that this is what the problem is. I'm also assuming that this will have to be changed by WebAssist.
Hope you can help with this. Anyway, just a heads up for anyone else experiencing issues.

NJ

Sign in to reply to this post

Jason ByrnesWebAssist

We do not set the protocol to use for sending the transaction to PayPal through cURL, this means it will use the hosts default protocol.

The Poodle vulnerability will only encountered if your host has SSLV3 s3et as the default protocol for cURL communications.

you should have your host disable SSLv3 for the cURL library and set TLS as the fall back.

more information on the Poodle vulnerability can be found here:
http://chrisburgess.com.au/how-to-test-for-the-sslv3-poodle-vulnerability/

To get information on the cause of the failure, add the following in the body section of the failure page:

<?php @session_start(); var_dump($_SESSION); ?>

this will write the session contents to the page including the gateways response. the gateways response will contain information on why the transaction failed.

Sign in to reply to this post

Nathon Jones Web Design

Sorry to rain on your parade Jason but Ray had to make changes to our website last night because there is a section within the eCart code that specifies SSL3. This was relating to integration with Cardinal Commerce where you have 3D Secure or SecureCode security checks on Visa and Mastercard transactions.

You also need to disable SSLv3 for the cURL library though, as you've said.

Can I also advise caution when adding <?php @session_start(); var_dump($_SESSION); ?> to your failure page. This exposes all of the card details on screen and we had a client forward a screenshot of the failure which, of course, contained all their card details! :(

Thank you.
NJ

Sign in to reply to this post

Jason ByrnesWebAssist

The cardinal commerce and 3d secure implementation is custom coding that is not standard in eCart.

The code that Ray had to edit is not standard eCart code, it was custom coding that he created trough Premiere support for site.

as for the var_dump, it is not intended to be left in place, but as a temporary troubleshooting tool.

Sign in to reply to this post

Nathon Jones Web Design

Yes, but I was highlighting the issue because I'm surely not the only WebAssist customer to use this...right? :(

Temporary or not, the users payment details are exposed on screen and it's not something that pleases them, let me tell you! ;)

NJ

Sign in to reply to this post

Jason ByrnesWebAssist

My answer to the Poodle question was based on standard eCart coding.

your implementation is not standard. I can't speak to non standard coding. I can only base my answer here in the forum on the standard coding.

if you prefer not to use var dup, see this tutorial:
http://www.webassist.com/tutorials/Debug-eCart-transaction-failures

Sign in to reply to this post

Build websites with a little help from your friends

Your friends over here at WebAssist! These Dreamweaver extensions will assist you in building unlimited, custom websites.

Build websites from already-built web applications

These out-of-the-box solutions provide you proven, tested applications that can be up and running now.  Build a store, a gallery, or a web-based email solution.

Want your website pre-built and hosted?

Close Windowclose

Rate your experience or provide feedback on this page

Account or customer service questions?
Please user our contact form.

Need technical support?
Please visit support to ask a question

Content

rating

Layout

rating

Ease of use

rating

security code refresh image

We do not respond to comments submitted from this page directly, but we do read and analyze any feedback and will use it to help make your experience better in the future.

Close Windowclose

We were unable to retrieve the attached file

Close Windowclose

Attach and remove files

add attachmentAdd attachment
Close Windowclose

Enter the URL you would like to link to in your post

Close Windowclose

This is how you use right click RTF editing

Enable right click RTF editing option allows you to add html markup into your tutorial such as images, bulleted lists, files and more...

-- click to close --

Uploading file...