Saleor is vulnerable to unauthenticated information disclosure via Python exceptions
CVE-2023-26052

3.7LOW

Key Information:

Vendor

Saleor

Status
Vendor
CVE Published:
2 March 2023

What is CVE-2023-26052?

Saleor is a headless, GraphQL commerce platform delivering personalized shopping experiences. Some internal Python exceptions are not handled properly and thus are returned in API as error messages. Some messages might contain sensitive information like infrastructure details in unauthenticated requests. This issue has been patched in versions 3.1.48, 3.7.59, 3.8.0, 3.9.27, 3.10.14 and 3.11.12.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

saleor >= 2.0.0, < 3.1.48 < 2.0.0, 3.1.48

saleor >= 3.11.0, < 3.11.12 < 3.11.0, 3.11.12

saleor >= 3.10.0, < 3.10.14 < 3.10.0, 3.10.14

References

CVSS V3.1

Score:
3.7
Severity:
LOW
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.