Lucene search

K
cve[email protected]CVE-2023-32694
HistoryMay 25, 2023 - 3:15 p.m.

CVE-2023-32694

2023-05-2515:15:09
CWE-208
CWE-203
web.nvd.nist.gov
30
saleor core
validate_hmac_signature
timing attacks
adyen plugin
security vulnerability
database integrity
patch
nvd

5.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N

0.001 Low

EPSS

Percentile

29.6%

Saleor Core is a composable, headless commerce API. Saleor’s validate_hmac_signature function is vulnerable to timing attacks. Malicious users could abuse this vulnerability on Saleor deployments having the Adyen plugin enabled in order to determine the secret key and forge fake events, this could affect the database integrity such as marking an order as paid when it is not. This issue has been patched in versions 3.7.68, 3.8.40, 3.9.49, 3.10.36, 3.11.35, 3.12.25, and 3.13.16.

Affected configurations

Vulners
NVD
Node
saleorsaleorRange2.11.03.7.68
OR
saleorsaleorRange3.8.03.8.40
OR
saleorsaleorRange3.9.03.9.49
OR
saleorsaleorRange3.10.03.10.36
OR
saleorsaleorRange3.11.03.11.35
OR
saleorsaleorRange3.12.03.12.25
OR
saleorsaleorRange3.13.03.13.16
VendorProductVersionCPE
saleorsaleor*cpe:2.3:a:saleor:saleor:*:*:*:*:*:*:*:*
saleorsaleor*cpe:2.3:a:saleor:saleor:*:*:*:*:*:*:*:*
saleorsaleor*cpe:2.3:a:saleor:saleor:*:*:*:*:*:*:*:*
saleorsaleor*cpe:2.3:a:saleor:saleor:*:*:*:*:*:*:*:*
saleorsaleor*cpe:2.3:a:saleor:saleor:*:*:*:*:*:*:*:*
saleorsaleor*cpe:2.3:a:saleor:saleor:*:*:*:*:*:*:*:*
saleorsaleor*cpe:2.3:a:saleor:saleor:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "saleor",
    "product": "saleor",
    "versions": [
      {
        "version": ">= 2.11.0, < 3.7.68",
        "status": "affected"
      },
      {
        "version": ">= 3.8.0, < 3.8.40",
        "status": "affected"
      },
      {
        "version": ">= 3.9.0, < 3.9.49",
        "status": "affected"
      },
      {
        "version": ">= 3.10.0, < 3.10.36",
        "status": "affected"
      },
      {
        "version": ">= 3.11.0, < 3.11.35",
        "status": "affected"
      },
      {
        "version": ">= 3.12.0, < 3.12.25",
        "status": "affected"
      },
      {
        "version": ">= 3.13.0, < 3.13.16",
        "status": "affected"
      }
    ]
  }
]

5.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N

0.001 Low

EPSS

Percentile

29.6%

Related for CVE-2023-32694