Skip to content
This repository has been archived by the owner on Jul 14, 2022. It is now read-only.

Client caching login operation with plaintext password

Low
patrys published GHSA-4279-h39w-2jqm Jun 30, 2020

Package

Saleor Storefront

Affected versions

< 2.10.3

Patched versions

2.10.3

Description

Impact

Request data used to authenticate customers was inadvertently cached in the browser's local storage mechanism, including credentials. A malicious user with direct access to the browser could extract the email and password.

Versions prior to 2.10.0 persisted the cache even after the user logged out.

Patches

The team is working on changing the caching policy of Saleor SDK. As Saleor SDK is not caching the responses, we're opening this advisory in Saleor Storefront instead.

Workarounds

A workaround is to manually clear application data (browser's local storage) after logging into Saleor Storefront.

References

https://cwe.mitre.org/data/definitions/312.html

For more information

If you have any questions or comments about this advisory:

Severity

Low

CVE ID

CVE-2020-15085

Weaknesses

No CWEs