Executive Summary

Informations
Name CVE-2020-15085 First vendor Publication 2020-06-30
Vendor Cve Last vendor Modification 2020-06-30

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

In Saleor Storefront before version 2.10.3, request data used to authenticate customers was inadvertently cached in the browser's local storage mechanism, including credentials. A malicious user with direct access to the browser could extract the email and password. In versions prior to 2.10.0 persisted the cache even after the user logged out. This is fixed in version 2.10.3. A workaround is to manually clear application data (browser's local storage) after logging into Saleor Storefront.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15085

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-312 Cleartext Storage of Sensitive Information

Sources (Detail)

Source Url
CONFIRM https://github.com/mirumee/saleor-storefront/security/advisories/GHSA-4279-h3...
MISC https://github.com/mirumee/saleor-storefront/blob/master/CHANGELOG.md#2103
https://github.com/mirumee/saleor-storefront/commit/7c331e1be805022c9a7be719b...

Alert History

If you want to see full details history, please login or register.
0
Date Informations
2020-06-30 21:23:00
  • First insertion