开发者

Hosted Payment Gateways and Hidden Field Tampering

开发者 https://www.devze.com 2023-03-21 17:21 出处:网络
I am in the midst of trying to find an e-commerce solution for my employer, and it is necessary that we go with a hosted payment page to minimize our PCI compliance woes. After researching several com

I am in the midst of trying to find an e-commerce solution for my employer, and it is necessary that we go with a hosted payment page to minimize our PCI compliance woes. After researching several companies' solutions, it seems that they all expect you to submit the total price of the transaction to them via a hidden field or GET variables in order to generate the payment form. This seems like a sizable concern for the merchant, since a user with Firebug (or eyes, in the case of GET variables) could easily modify the transaction total, get a new开发者_运维问答 hosted payment form, and continue with the checkout, thus giving themselves whatever discount they desire.

Has anyone set up a hosted payment page before and dealt with this issue? Any suggestions for a better way to do things?


There usually is a hash submitted with those forms that are generated with secret values that the user won't know (e.g. password, transaction key, etc). So if they tamper with the amount, which is also used in calculating the hash's value, then the payment gateway will reject the transaction. The user cannot bypass this by changing the hash because they do not have all of the information required to calculate it.

So using these hosted forms are safe from abuse. If they weren't they wouldn't be viable products and the gateways couldn't offer them for use.

0

精彩评论

暂无评论...
验证码 换一张
取 消