- Description
- Saleor is an e-commerce platform. Starting in version 3.10.0 and prior to versions 3.14.64, 3.15.39, 3.16.39, 3.17.35, 3.18.31, and 3.19.19, an attacker may bypass cross-set request forgery (CSRF) validation when calling refresh token mutation with empty string. When a user provides an empty string in `refreshToken` mutation, while the token persists in `JWT_REFRESH_TOKEN_COOKIE_NAME` cookie, application omits validation against CSRF token and returns valid access token. Versions 3.14.64, 3.15.39, 3.16.39, 3.17.35, 3.18.31, and 3.19.19 contain a patch for the issue. As a workaround, one may replace `saleor.graphql.account.mutations.authentication.refresh_token.py.get_refresh_token`. This will fix the issue, but be aware, that it returns `JWT_MISSING_TOKEN` instead of `JWT_INVALID_TOKEN`.
- Source
- security-advisories@github.com
- NVD status
- Analyzed
- Products
- saleor
[
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:saleor:saleor:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6AA9F9AF-E3A8-4D19-AC63-AB1F2115906F",
"versionEndExcluding": "3.14.64",
"versionStartIncluding": "3.10.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:saleor:saleor:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A592CB29-C622-4DCF-AD16-E6B103899F8A",
"versionEndExcluding": "3.15.39",
"versionStartIncluding": "3.15.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:saleor:saleor:*:*:*:*:*:*:*:*",
"matchCriteriaId": "485BC5CE-2874-42E2-BFD9-5529046ED09B",
"versionEndExcluding": "3.16.39",
"versionStartIncluding": "3.16.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:saleor:saleor:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7D126A50-1C0D-4389-9316-9EC6BFAFFA95",
"versionEndExcluding": "3.17.35",
"versionStartIncluding": "3.17.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:saleor:saleor:*:*:*:*:*:*:*:*",
"matchCriteriaId": "895CE01A-B60F-473F-9208-A36CAD6FA818",
"versionEndExcluding": "3.18.31",
"versionStartIncluding": "3.18.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:saleor:saleor:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C995842D-3835-4EAE-9C86-E0EF95A4716E",
"versionEndExcluding": "3.19.19",
"versionStartIncluding": "3.19.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
]