Saleor Storefront is software for building e-commerce experiences. Prior to commit 579241e75a5eb332ccf26e0bcdd54befa33f4783, when any user authenticates in the storefront, anonymous users are able to access their data. The session is leaked through cache and can be accessed by anyone. Users should upgrade to a version that incorporates commit 579241e75a5eb332ccf26e0bcdd54befa33f4783 or later to receive a patch. A possible workaround is to temporarily disable authentication by changing the usage of `createSaleorAuthClient()`.
References
Configurations
No configuration.
History
21 Nov 2024, 09:07
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References | () https://github.com/saleor/auth-sdk/commit/56db13407aa35d00b85ec2df042692edd4aea9da - | |
References | () https://github.com/saleor/saleor-docs/pull/1120 - | |
References | () https://github.com/saleor/storefront/commit/579241e75a5eb332ccf26e0bcdd54befa33f4783 - | |
References | () https://github.com/saleor/storefront/security/advisories/GHSA-52cq-c7x7-cqw4 - |
20 Mar 2024, 21:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-03-20 21:15
Updated : 2024-11-21 09:07
NVD link : CVE-2024-29036
Mitre link : CVE-2024-29036
CVE.ORG link : CVE-2024-29036
JSON object : View
Products Affected
No product.
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor