In Saleor Storefront before version 2.10.3, request data used to authenticate customers was inadvertently cached in the browser's local storage mechanism, including credentials. A malicious user with direct access to the browser could extract the email and password. In versions prior to 2.10.0 persisted the cache even after the user logged out. This is fixed in version 2.10.3. A workaround is to manually clear application data (browser's local storage) after logging into Saleor Storefront.
References
Link | Resource |
---|---|
https://github.com/mirumee/saleor-storefront/blob/master/CHANGELOG.md#2103 | Release Notes Third Party Advisory |
https://github.com/mirumee/saleor-storefront/security/advisories/GHSA-4279-h39w-2jqm | Third Party Advisory |
https://github.com/mirumee/saleor-storefront/commit/7c331e1be805022c9a7be719bd69d050b2577458 | Patch Third Party Advisory |
Configurations
Information
Published : 2020-06-30 10:15
Updated : 2020-07-28 08:45
NVD link : CVE-2020-15085
Mitre link : CVE-2020-15085
JSON object : View
CWE
CWE-312
Cleartext Storage of Sensitive Information
Products Affected
mirumee
- saleor