May 25, 2023, 3:15 p.m. |

National Vulnerability Database web.nvd.nist.gov

Saleor Core is a composable, headless commerce API. Saleor's `validate_hmac_signature` function is vulnerable to timing attacks. Malicious users could abuse this vulnerability on Saleor deployments having the Adyen plugin enabled in order to determine the secret key and forge fake events, this could affect the database integrity such as marking an order as paid when it is not. This issue has been patched in versions 3.7.68, 3.8.40, 3.9.49, 3.10.36, 3.11.35, 3.12.25, and 3.13.16.

abuse api attacks commerce cve database events fake forge function headless integrity key malicious order paid plugin secret secret key vulnerability vulnerable

Information Security Engineers

@ D. E. Shaw Research | New York City

Senior Cybersecurity Technical Delivery Manager

@ MUFG | London Ropemaker place

Junior consultant-Technology Risk

@ EY | Bratislava, SK, 811 02

Director of Security Engineering, Information Security

@ Illumio | Sunnyvale, California

Cyber Analyst II 03396 NWG

@ North Wind Group | KNOXVILLE, TN

CRIT Information Security Officer (f/m/d)

@ Deutsche Börse | Frankfurt am Main, DE