<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic HostedPayment token security issue in Integration and Testing</title>
    <link>https://community.developer.cybersource.com/t5/Integration-and-Testing/HostedPayment-token-security-issue/m-p/73426#M45476</link>
    <description>&lt;P&gt;I am implementing HostedPayment using an embedded frame. while integrating I have noticed that the generated token is available on the parent page which can be easily manipulated with a different token. As the form and iframe are on the same page so anyone can manipulate the HTML through the inspect the element and inject another token instead of a real one with a different merchant id and all the payment will move to that merchant account. below is the form which your document says to implement. could you please look into it?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;lt;div id="iframeHolder" class="center-block" style="width:90%;max-width: 1000px"&amp;gt;&lt;BR /&gt;&amp;lt;iframe id="loadPayment" class="embed-responsive-item" name="loadPayment" width="100%" height="650px" frameborder="0" scrolling="no" hidden="true"&amp;gt;&lt;BR /&gt;&amp;lt;/iframe&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;lt;form id="sendhptoken" name="sendhptoken" action="&lt;A href="https://test.authorize.net/payment/payment" target="_blank" rel="noopener"&gt;https://test.authorize.net/payment/payment&lt;/A&gt;" method="post" target="loadPayment"&amp;gt;&lt;BR /&gt;&amp;lt;input type="text" name="token" value="{{token}}" /&amp;gt;&lt;BR /&gt;&amp;lt;/form&amp;gt;&lt;BR /&gt;&amp;lt;/div&amp;gt;&lt;/P&gt;</description>
    <pubDate>Sun, 04 Oct 2020 09:22:19 GMT</pubDate>
    <dc:creator>vishal15</dc:creator>
    <dc:date>2020-10-04T09:22:19Z</dc:date>
    <item>
      <title>HostedPayment token security issue</title>
      <link>https://community.developer.cybersource.com/t5/Integration-and-Testing/HostedPayment-token-security-issue/m-p/73426#M45476</link>
      <description>&lt;P&gt;I am implementing HostedPayment using an embedded frame. while integrating I have noticed that the generated token is available on the parent page which can be easily manipulated with a different token. As the form and iframe are on the same page so anyone can manipulate the HTML through the inspect the element and inject another token instead of a real one with a different merchant id and all the payment will move to that merchant account. below is the form which your document says to implement. could you please look into it?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;lt;div id="iframeHolder" class="center-block" style="width:90%;max-width: 1000px"&amp;gt;&lt;BR /&gt;&amp;lt;iframe id="loadPayment" class="embed-responsive-item" name="loadPayment" width="100%" height="650px" frameborder="0" scrolling="no" hidden="true"&amp;gt;&lt;BR /&gt;&amp;lt;/iframe&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;lt;form id="sendhptoken" name="sendhptoken" action="&lt;A href="https://test.authorize.net/payment/payment" target="_blank" rel="noopener"&gt;https://test.authorize.net/payment/payment&lt;/A&gt;" method="post" target="loadPayment"&amp;gt;&lt;BR /&gt;&amp;lt;input type="text" name="token" value="{{token}}" /&amp;gt;&lt;BR /&gt;&amp;lt;/form&amp;gt;&lt;BR /&gt;&amp;lt;/div&amp;gt;&lt;/P&gt;</description>
      <pubDate>Sun, 04 Oct 2020 09:22:19 GMT</pubDate>
      <guid>https://community.developer.cybersource.com/t5/Integration-and-Testing/HostedPayment-token-security-issue/m-p/73426#M45476</guid>
      <dc:creator>vishal15</dc:creator>
      <dc:date>2020-10-04T09:22:19Z</dc:date>
    </item>
  </channel>
</rss>

