Exploit Report

Computer Security And Bug Information

CVE-2023-32694

CVECVE-2023-32694
CVE Title
Published Date2023-05-25T15:15Z
Modified Date2023-05-25T15:58Z
CWE TypeCWE-203
DescriptionSaleor Core is a composable, headless commerce API. Saleor's `validate_hmac_signature` function is vulnerable to timing attacks. Malicious users could abuse this vulnerability on Saleor deployments having the Adyen plugin enabled in order to determine the secret key and forge fake events, this could affect the database integrity such as marking an order as paid when it is not. This issue has been patched in versions 3.7.68, 3.8.40, 3.9.49, 3.10.36, 3.11.35, 3.12.25, and 3.13.16.
References
By clicking these links you will leave this website. We do not endorse and will not be held accountable for any activity on external sites.
Reference URLhttps://github.com/saleor/saleor/commit/1328274e1a3d04ab87d7daee90229ff47b3bc35e
Reference DescriptionMISC https://github.com/saleor/saleor/commit/1328274e1a3d04ab87d7daee90229ff47b3bc35e
Reference URLhttps://github.com/saleor/saleor/security/advisories/GHSA-3rqj-9v87-2x3f
Reference DescriptionMISC https://github.com/saleor/saleor/security/advisories/GHSA-3rqj-9v87-2x3f
Sources NIST MITRE
Note
  • No CVSS data for this CVE

This site's data is aggregated programmatically and provided "as is" without any representations or warranties, express or implied. Exploit.report is not affiliated with the The MITRE Corporation, U.S. Department of Homeland Security (DHS), Cybersecurity and Infrastructure Security Agency (CISA), or US government in any way. CVE and the CVE logo are registered trademarks of The MITRE Corporation

© 2022 Exploit.Report | Data | Contact | Privacy Policy | Articles