logo

CVE-2023-26052 saleor

Package

Manager: pip
Name: saleor
Vulnerable Version: >=2.0.0 <3.1.48 || >=3.11.0 <3.11.12 || >=3.10.0 <3.10.14 || >=3.9.0 <3.9.27 || >=3.8.0 <3.8.30 || >=3.7.0 <3.7.59

Severity

Level: Low

CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00599 pctl0.68489

Details

Saleor Unauthenticated Information Disclosure Vulnerability via Python Exceptions ### Impact Some internal Python exceptions are not handled properly and thus are returned in API as error messages. Some messages might contain sensitive information like infrastructure details in unauthenticated requests. Affected versions: Saleor ≥ 2.0.0 ### Workarounds None ### For more information If you have any questions or comments about this advisory: * Open a discussion at https://github.com/saleor/saleor/discussions * Email us at [hello@saleor.io](mailto:hello@saleor.io)

Metadata

Created: 2023-03-02T23:04:10Z
Modified: 2023-03-13T19:18:39Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/03/GHSA-3hvj-3cg9-v242/GHSA-3hvj-3cg9-v242.json
CWE IDs: ["CWE-209"]
Alternative ID: GHSA-3hvj-3cg9-v242
Finding: F037
Auto approve: 1