CVE-2023-26051 – saleor
Package
Manager: pip
Name: saleor
Vulnerable Version: >=2.0.0 <3.1.48 || >=3.11.0 <3.11.12 || >=3.10.0 <3.10.14 || >=3.9.0 <3.9.27 || >=3.8.0 <3.8.30 || >=3.7.0 <3.7.59
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS: 0.0073 pctl0.71827
Details
Saleor has Staff-Authenticated Error Message Information Disclosure Vulnerability via Python Exceptions ### Impact Some internal Python exceptions are not handled properly and thus are returned in API as error messages. Some messages might contain sensitive information like user email address in staff-authenticated requests. This issue has been patched in versions 3.1.48, 3.7.59, 3.8.30, 3.9.27, 3.10.14 and 3.11.12. ### Workarounds None ### For more information If you have any questions or comments about this advisory: * Open a discussion at https://github.com/saleor/saleor/discussions * Email us at [hello@saleor.io](mailto:hello@saleor.io)
Metadata
Created: 2023-03-03T22:46:04Z
Modified: 2023-03-03T22:46:04Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/03/GHSA-r8qr-wwg3-2r85/GHSA-r8qr-wwg3-2r85.json
CWE IDs: ["CWE-209"]
Alternative ID: GHSA-r8qr-wwg3-2r85
Finding: F037
Auto approve: 1