All the vulnerabilites related to getsentry - sentry
cve-2023-39531
Vulnerability from cvelistv5
Published
2023-08-09 16:09
Modified
2024-10-03 15:12
Severity ?
EPSS score ?
Summary
Sentry is an error tracking and performance monitoring platform. Starting in version 10.0.0 and prior to version 23.7.2, an attacker with sufficient client-side exploits could retrieve a valid access token for another user during the OAuth token exchange due to incorrect credential validation. The client ID must be known and the API application must have already been authorized on the targeted user account. Sentry SaaS customers do not need to take any action. Self-hosted installations should upgrade to version 23.7.2 or higher. There are no direct workarounds, but users should review applications authorized on their account and remove any that are no longer needed.
References
▼ | URL | Tags |
---|---|---|
https://github.com/getsentry/sentry/security/advisories/GHSA-hgj4-h2x3-rfx4 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:10:21.377Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/getsentry/sentry/security/advisories/GHSA-hgj4-h2x3-rfx4", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/getsentry/sentry/security/advisories/GHSA-hgj4-h2x3-rfx4" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-39531", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-03T15:12:07.030429Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-03T15:12:18.720Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "sentry", "vendor": "getsentry", "versions": [ { "status": "affected", "version": "\u003e= 10.0.0, \u003c 23.7.2" } ] } ], "descriptions": [ { "lang": "en", "value": "Sentry is an error tracking and performance monitoring platform. Starting in version 10.0.0 and prior to version 23.7.2, an attacker with sufficient client-side exploits could retrieve a valid access token for another user during the OAuth token exchange due to incorrect credential validation. The client ID must be known and the API application must have already been authorized on the targeted user account. Sentry SaaS customers do not need to take any action. Self-hosted installations should upgrade to version 23.7.2 or higher. There are no direct workarounds, but users should review applications authorized on their account and remove any that are no longer needed.\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-287", "description": "CWE-287: Improper Authentication", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-09T16:09:34.265Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/getsentry/sentry/security/advisories/GHSA-hgj4-h2x3-rfx4", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/getsentry/sentry/security/advisories/GHSA-hgj4-h2x3-rfx4" } ], "source": { "advisory": "GHSA-hgj4-h2x3-rfx4", "discovery": "UNKNOWN" }, "title": "Sentry vulnerable to incorrect credential validation on OAuth token requests" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-39531", "datePublished": "2023-08-09T16:09:34.265Z", "dateReserved": "2023-08-03T16:27:36.263Z", "dateUpdated": "2024-10-03T15:12:18.720Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-41656
Vulnerability from cvelistv5
Published
2024-07-23 21:30
Modified
2024-08-13 20:29
Severity ?
EPSS score ?
Summary
Sentry is an error tracking and performance monitoring platform. Starting in version 10.0.0 and prior to version 24.7.1, an unsanitized payload sent by an Integration platform integration allows storing arbitrary HTML tags on the Sentry side with the subsequent rendering them on the Issues page. Self-hosted Sentry users may be impacted in case of untrustworthy Integration platform integrations sending external issues from their side to Sentry. A patch has been released in Sentry 24.7.1. For Sentry SaaS customers, no action is needed. This has been patched on July 23, and even prior to the fix, the exploitation was not possible due to the strict Content Security Policy deployed on sentry.io site. For self-hosted users, the maintainers of Sentry strongly recommend upgrading Sentry to the latest version. If it is not possible, one could enable CSP on one's self-hosted installation with `CSP_REPORT_ONLY = False` (enforcing mode). This will mitigate the risk of cross-site scripting.
References
▼ | URL | Tags |
---|---|---|
https://github.com/getsentry/sentry/security/advisories/GHSA-fm88-hc3v-3www | x_refsource_CONFIRM | |
https://github.com/getsentry/sentry/pull/74648 | x_refsource_MISC | |
https://github.com/getsentry/sentry/commit/5c679521f1539eabfb81287bfc30f34dbecd373e | x_refsource_MISC | |
https://github.com/getsentry/self-hosted/releases/tag/24.7.1 | x_refsource_MISC |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:getsentry:sentry:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "sentry", "vendor": "getsentry", "versions": [ { "lessThan": "24.7.1", "status": "affected", "version": "10.0.0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-41656", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-07-24T13:34:14.634010Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-13T20:29:11.466Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T04:46:52.659Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/getsentry/sentry/security/advisories/GHSA-fm88-hc3v-3www", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/getsentry/sentry/security/advisories/GHSA-fm88-hc3v-3www" }, { "name": "https://github.com/getsentry/sentry/pull/74648", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/getsentry/sentry/pull/74648" }, { "name": "https://github.com/getsentry/sentry/commit/5c679521f1539eabfb81287bfc30f34dbecd373e", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/getsentry/sentry/commit/5c679521f1539eabfb81287bfc30f34dbecd373e" }, { "name": "https://github.com/getsentry/self-hosted/releases/tag/24.7.1", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/getsentry/self-hosted/releases/tag/24.7.1" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "sentry", "vendor": "getsentry", "versions": [ { "status": "affected", "version": "\u003e= 10.0.0, \u003c 24.7.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Sentry is an error tracking and performance monitoring platform. Starting in version 10.0.0 and prior to version 24.7.1, an unsanitized payload sent by an Integration platform integration allows storing arbitrary HTML tags on the Sentry side with the subsequent rendering them on the Issues page. Self-hosted Sentry users may be impacted in case of untrustworthy Integration platform integrations sending external issues from their side to Sentry. A patch has been released in Sentry 24.7.1. For Sentry SaaS customers, no action is needed. This has been patched on July 23, and even prior to the fix, the exploitation was not possible due to the strict Content Security Policy deployed on sentry.io site. For self-hosted users, the maintainers of Sentry strongly recommend upgrading Sentry to the latest version. If it is not possible, one could enable CSP on one\u0027s self-hosted installation with `CSP_REPORT_ONLY = False` (enforcing mode). This will mitigate the risk of cross-site scripting." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-23T21:30:25.526Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/getsentry/sentry/security/advisories/GHSA-fm88-hc3v-3www", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/getsentry/sentry/security/advisories/GHSA-fm88-hc3v-3www" }, { "name": "https://github.com/getsentry/sentry/pull/74648", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/getsentry/sentry/pull/74648" }, { "name": "https://github.com/getsentry/sentry/commit/5c679521f1539eabfb81287bfc30f34dbecd373e", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/getsentry/sentry/commit/5c679521f1539eabfb81287bfc30f34dbecd373e" }, { "name": "https://github.com/getsentry/self-hosted/releases/tag/24.7.1", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/getsentry/self-hosted/releases/tag/24.7.1" } ], "source": { "advisory": "GHSA-fm88-hc3v-3www", "discovery": "UNKNOWN" }, "title": "Sentry vulnerable to stored Cross-Site Scripting (XSS)" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-41656", "datePublished": "2024-07-23T21:30:25.526Z", "dateReserved": "2024-07-18T15:21:47.481Z", "dateUpdated": "2024-08-13T20:29:11.466Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-36829
Vulnerability from cvelistv5
Published
2023-07-06 22:08
Modified
2024-11-06 16:44
Severity ?
EPSS score ?
Summary
Sentry is an error tracking and performance monitoring platform. Starting in version 23.6.0 and prior to version 23.6.2, the Sentry API incorrectly returns the `access-control-allow-credentials: true` HTTP header if the `Origin` request header ends with the `system.base-hostname` option of Sentry installation. This only affects installations that have `system.base-hostname` option explicitly set, as it is empty by default. Impact is limited since recent versions of major browsers have cross-site cookie blocking enabled by default. However, this flaw could allow other multi-step attacks. The patch has been released in Sentry 23.6.2.
References
▼ | URL | Tags |
---|---|---|
https://github.com/getsentry/sentry/security/advisories/GHSA-4xqm-4p72-87h6 | x_refsource_CONFIRM | |
https://github.com/getsentry/sentry/pull/52276 | x_refsource_MISC | |
https://github.com/getsentry/sentry/commit/ee44c6be35e5e464bc40637580f39867898acd8b | x_refsource_MISC | |
https://github.com/getsentry/self-hosted/releases/tag/23.6.2 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T17:01:09.196Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/getsentry/sentry/security/advisories/GHSA-4xqm-4p72-87h6", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/getsentry/sentry/security/advisories/GHSA-4xqm-4p72-87h6" }, { "name": "https://github.com/getsentry/sentry/pull/52276", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/getsentry/sentry/pull/52276" }, { "name": "https://github.com/getsentry/sentry/commit/ee44c6be35e5e464bc40637580f39867898acd8b", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/getsentry/sentry/commit/ee44c6be35e5e464bc40637580f39867898acd8b" }, { "name": "https://github.com/getsentry/self-hosted/releases/tag/23.6.2", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/getsentry/self-hosted/releases/tag/23.6.2" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:sentry:sentry:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "sentry", "vendor": "sentry", "versions": [ { "lessThan": "23.6.2", "status": "affected", "version": "23.6.0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-36829", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-06T16:41:56.650447Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-06T16:44:37.019Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "sentry", "vendor": "getsentry", "versions": [ { "status": "affected", "version": "\u003e= 23.6.0, \u003c 23.6.2" } ] } ], "descriptions": [ { "lang": "en", "value": "Sentry is an error tracking and performance monitoring platform. Starting in version 23.6.0 and prior to version 23.6.2, the Sentry API incorrectly returns the `access-control-allow-credentials: true` HTTP header if the `Origin` request header ends with the `system.base-hostname` option of Sentry installation. This only affects installations that have `system.base-hostname` option explicitly set, as it is empty by default. Impact is limited since recent versions of major browsers have cross-site cookie blocking enabled by default. However, this flaw could allow other multi-step attacks. The patch has been released in Sentry 23.6.2." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-942", "description": "CWE-942: Permissive Cross-domain Policy with Untrusted Domains", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-863", "description": "CWE-863: Incorrect Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-06T22:08:58.922Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/getsentry/sentry/security/advisories/GHSA-4xqm-4p72-87h6", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/getsentry/sentry/security/advisories/GHSA-4xqm-4p72-87h6" }, { "name": "https://github.com/getsentry/sentry/pull/52276", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/getsentry/sentry/pull/52276" }, { "name": "https://github.com/getsentry/sentry/commit/ee44c6be35e5e464bc40637580f39867898acd8b", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/getsentry/sentry/commit/ee44c6be35e5e464bc40637580f39867898acd8b" }, { "name": "https://github.com/getsentry/self-hosted/releases/tag/23.6.2", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/getsentry/self-hosted/releases/tag/23.6.2" } ], "source": { "advisory": "GHSA-4xqm-4p72-87h6", "discovery": "UNKNOWN" }, "title": "Sentry CORS misconfiguration vulnerability" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-36829", "datePublished": "2023-07-06T22:08:58.922Z", "dateReserved": "2023-06-27T15:43:18.388Z", "dateUpdated": "2024-11-06T16:44:37.019Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-45606
Vulnerability from cvelistv5
Published
2024-09-17 19:43
Modified
2024-09-18 13:20
Severity ?
EPSS score ?
Summary
Sentry is a developer-first error tracking and performance monitoring platform. An authenticated user can mute alert rules from arbitrary organizations and projects with a know rule ID. The user does not need to be a member of the organization or have permissions on the project. In our review, we have identified no instances where alerts have been muted by unauthorized parties. A patch was issued to ensure authorization checks are properly scoped on requests to mute alert rules. Authenticated users who do not have the necessary permissions are no longer able to mute alerts. Sentry SaaS users do not need to take any action. Self-Hosted Sentry users should upgrade to version **24.9.0** or higher. The rule mute feature was generally available as of 23.6.0 but users with early access may have had the feature as of 23.4.0. Affected users are advised to upgrade to version 24.9.0. There are no known workarounds for this vulnerability.
References
▼ | URL | Tags |
---|---|---|
https://github.com/getsentry/sentry/security/advisories/GHSA-v345-w9f2-mpm5 | x_refsource_CONFIRM | |
https://github.com/getsentry/sentry/pull/77016 | x_refsource_MISC | |
https://github.com/getsentry/self-hosted | x_refsource_MISC |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-45606", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-18T13:20:21.809204Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-18T13:20:30.270Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "sentry", "vendor": "getsentry", "versions": [ { "status": "affected", "version": "\u003e=23.4.0, \u003c 24.9.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Sentry is a developer-first error tracking and performance monitoring platform. An authenticated user can mute alert rules from arbitrary organizations and projects with a know rule ID. The user does not need to be a member of the organization or have permissions on the project. In our review, we have identified no instances where alerts have been muted by unauthorized parties. A patch was issued to ensure authorization checks are properly scoped on requests to mute alert rules. Authenticated users who do not have the necessary permissions are no longer able to mute alerts. Sentry SaaS users do not need to take any action. Self-Hosted Sentry users should upgrade to version **24.9.0** or higher. The rule mute feature was generally available as of 23.6.0 but users with early access may have had the feature as of 23.4.0. Affected users are advised to upgrade to version 24.9.0. There are no known workarounds for this vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-639", "description": "CWE-639: Authorization Bypass Through User-Controlled Key", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-17T19:43:18.650Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/getsentry/sentry/security/advisories/GHSA-v345-w9f2-mpm5", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/getsentry/sentry/security/advisories/GHSA-v345-w9f2-mpm5" }, { "name": "https://github.com/getsentry/sentry/pull/77016", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/getsentry/sentry/pull/77016" }, { "name": "https://github.com/getsentry/self-hosted", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/getsentry/self-hosted" } ], "source": { "advisory": "GHSA-v345-w9f2-mpm5", "discovery": "UNKNOWN" }, "title": "Improper authorization on muting of alert rules in sentry" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-45606", "datePublished": "2024-09-17T19:43:18.650Z", "dateReserved": "2024-09-02T16:00:02.424Z", "dateUpdated": "2024-09-18T13:20:30.270Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-35196
Vulnerability from cvelistv5
Published
2024-05-31 17:25
Modified
2024-08-02 03:07
Severity ?
EPSS score ?
Summary
Sentry is a developer-first error tracking and performance monitoring platform. Sentry's Slack integration incorrectly records the incoming request body in logs. This request data can contain sensitive information, including the deprecated Slack verification token. With this verification token, it is possible under specific configurations, an attacker can forge requests and act as the Slack integration. The request body is leaked in log entries matching `event == "slack.*" && name == "sentry.integrations.slack" && request_data == *`. The deprecated slack verification token, will be found in the `request_data.token` key. **SaaS users** do not need to take any action. **Self-hosted users** should upgrade to version 24.5.0 or higher, rotate their Slack verification token, and use the Slack Signing Secret instead of the verification token. For users only using the `slack.signing-secret` in their self-hosted configuration, the legacy verification token is not used to verify the webhook payload. It is ignored. Users unable to upgrade should either set the `slack.signing-secret` instead of `slack.verification-token`. The signing secret is Slack's recommended way of authenticating webhooks. By having `slack.singing-secret` set, Sentry self-hosted will no longer use the verification token for authentication of the webhooks, regardless of whether `slack.verification-token` is set or not. Alternatively if the self-hosted instance is unable to be upgraded or re-configured to use the `slack.signing-secret`, the logging configuration can be adjusted to not generate logs from the integration. The default logging configuration can be found in `src/sentry/conf/server.py`. **Services should be restarted once the configuration change is saved.**
References
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-35196", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-06-06T18:04:07.244703Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-06T18:04:18.333Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T03:07:46.866Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/getsentry/sentry/security/advisories/GHSA-c2g2-gx4j-rj3j", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/getsentry/sentry/security/advisories/GHSA-c2g2-gx4j-rj3j" }, { "name": "https://github.com/getsentry/sentry/pull/70508", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/getsentry/sentry/pull/70508" }, { "name": "https://api.slack.com/authentication/verifying-requests-from-slack#app-management-updates", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://api.slack.com/authentication/verifying-requests-from-slack#app-management-updates" }, { "name": "https://api.slack.com/authentication/verifying-requests-from-slack#deprecation", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://api.slack.com/authentication/verifying-requests-from-slack#deprecation" }, { "name": "https://api.slack.com/authentication/verifying-requests-from-slack#regenerating", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://api.slack.com/authentication/verifying-requests-from-slack#regenerating" }, { "name": "https://develop.sentry.dev/integrations/slack", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://develop.sentry.dev/integrations/slack" }, { "name": "https://github.com/getsentry/sentry/blob/17d2b87e39ccd57e11da4deed62971ff306253d1/src/sentry/conf/server.py#L1307", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/getsentry/sentry/blob/17d2b87e39ccd57e11da4deed62971ff306253d1/src/sentry/conf/server.py#L1307" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "sentry", "vendor": "getsentry", "versions": [ { "status": "affected", "version": "\u003e= 24.3.0, \u003c 24.5.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Sentry is a developer-first error tracking and performance monitoring platform. Sentry\u0027s Slack integration incorrectly records the incoming request body in logs. This request data can contain sensitive information, including the deprecated Slack verification token. With this verification token, it is possible under specific configurations, an attacker can forge requests and act as the Slack integration. The request body is leaked in log entries matching `event == \"slack.*\" \u0026\u0026 name == \"sentry.integrations.slack\" \u0026\u0026 request_data == *`. The deprecated slack verification token, will be found in the `request_data.token` key. **SaaS users** do not need to take any action. **Self-hosted users** should upgrade to version 24.5.0 or higher, rotate their Slack verification token, and use the Slack Signing Secret instead of the verification token. For users only using the `slack.signing-secret` in their self-hosted configuration, the legacy verification token is not used to verify the webhook payload. It is ignored. Users unable to upgrade should either set the `slack.signing-secret` instead of `slack.verification-token`. The signing secret is Slack\u0027s recommended way of authenticating webhooks. By having `slack.singing-secret` set, Sentry self-hosted will no longer use the verification token for authentication of the webhooks, regardless of whether `slack.verification-token` is set or not. Alternatively if the self-hosted instance is unable to be upgraded or re-configured to use the `slack.signing-secret`, the logging configuration can be adjusted to not generate logs from the integration. The default logging configuration can be found in `src/sentry/conf/server.py`. **Services should be restarted once the configuration change is saved.**\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 2, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-532", "description": "CWE-532: Insertion of Sensitive Information into Log File", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-31T17:26:07.151Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/getsentry/sentry/security/advisories/GHSA-c2g2-gx4j-rj3j", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/getsentry/sentry/security/advisories/GHSA-c2g2-gx4j-rj3j" }, { "name": "https://github.com/getsentry/sentry/pull/70508", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/getsentry/sentry/pull/70508" }, { "name": "https://api.slack.com/authentication/verifying-requests-from-slack#app-management-updates", "tags": [ "x_refsource_MISC" ], "url": "https://api.slack.com/authentication/verifying-requests-from-slack#app-management-updates" }, { "name": "https://api.slack.com/authentication/verifying-requests-from-slack#deprecation", "tags": [ "x_refsource_MISC" ], "url": "https://api.slack.com/authentication/verifying-requests-from-slack#deprecation" }, { "name": "https://api.slack.com/authentication/verifying-requests-from-slack#regenerating", "tags": [ "x_refsource_MISC" ], "url": "https://api.slack.com/authentication/verifying-requests-from-slack#regenerating" }, { "name": "https://develop.sentry.dev/integrations/slack", "tags": [ "x_refsource_MISC" ], "url": "https://develop.sentry.dev/integrations/slack" }, { "name": "https://github.com/getsentry/sentry/blob/17d2b87e39ccd57e11da4deed62971ff306253d1/src/sentry/conf/server.py#L1307", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/getsentry/sentry/blob/17d2b87e39ccd57e11da4deed62971ff306253d1/src/sentry/conf/server.py#L1307" } ], "source": { "advisory": "GHSA-c2g2-gx4j-rj3j", "discovery": "UNKNOWN" }, "title": "Slack integration leaks sensitive information in logs in Sentry" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-35196", "datePublished": "2024-05-31T17:25:55.716Z", "dateReserved": "2024-05-10T14:24:24.342Z", "dateUpdated": "2024-08-02T03:07:46.866Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-36826
Vulnerability from cvelistv5
Published
2023-07-25 18:50
Modified
2024-10-03 19:25
Severity ?
EPSS score ?
Summary
Sentry is an error tracking and performance monitoring platform. Starting in version 8.21.0 and prior to version 23.5.2, an authenticated user can download a debug or artifact bundle from arbitrary organizations and projects with a known bundle ID. The user does not need to be a member of the organization or have permissions on the project. A patch was issued in version 23.5.2 to ensure authorization checks are properly scoped on requests to retrieve debug or artifact bundles. Authenticated users who do not have the necessary permissions on the particular project are no longer able to download them. Sentry SaaS users do not need to take any action. Self-Hosted Sentry users should upgrade to version 23.5.2 or higher.
References
▼ | URL | Tags |
---|---|---|
https://github.com/getsentry/sentry/security/advisories/GHSA-m4hc-m2v6-hfw8 | x_refsource_CONFIRM | |
https://github.com/getsentry/sentry/pull/49680 | x_refsource_MISC | |
https://github.com/getsentry/sentry/commit/e932b15435bf36239431eaa3790a6bcfa47046a9 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T17:01:09.754Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/getsentry/sentry/security/advisories/GHSA-m4hc-m2v6-hfw8", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/getsentry/sentry/security/advisories/GHSA-m4hc-m2v6-hfw8" }, { "name": "https://github.com/getsentry/sentry/pull/49680", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/getsentry/sentry/pull/49680" }, { "name": "https://github.com/getsentry/sentry/commit/e932b15435bf36239431eaa3790a6bcfa47046a9", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/getsentry/sentry/commit/e932b15435bf36239431eaa3790a6bcfa47046a9" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-36826", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-03T19:25:05.837092Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-03T19:25:30.691Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "sentry", "vendor": "getsentry", "versions": [ { "status": "affected", "version": "\u003e= 8.21.0, \u003c 23.5.2" } ] } ], "descriptions": [ { "lang": "en", "value": "Sentry is an error tracking and performance monitoring platform. Starting in version 8.21.0 and prior to version 23.5.2, an authenticated user can download a debug or artifact bundle from arbitrary organizations and projects with a known bundle ID. The user does not need to be a member of the organization or have permissions on the project. A patch was issued in version 23.5.2 to ensure authorization checks are properly scoped on requests to retrieve debug or artifact bundles. Authenticated users who do not have the necessary permissions on the particular project are no longer able to download them. Sentry SaaS users do not need to take any action. Self-Hosted Sentry users should upgrade to version 23.5.2 or higher." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-285", "description": "CWE-285: Improper Authorization", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-863", "description": "CWE-863: Incorrect Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-25T18:50:42.350Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/getsentry/sentry/security/advisories/GHSA-m4hc-m2v6-hfw8", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/getsentry/sentry/security/advisories/GHSA-m4hc-m2v6-hfw8" }, { "name": "https://github.com/getsentry/sentry/pull/49680", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/getsentry/sentry/pull/49680" }, { "name": "https://github.com/getsentry/sentry/commit/e932b15435bf36239431eaa3790a6bcfa47046a9", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/getsentry/sentry/commit/e932b15435bf36239431eaa3790a6bcfa47046a9" } ], "source": { "advisory": "GHSA-m4hc-m2v6-hfw8", "discovery": "UNKNOWN" }, "title": "Sentry vulnerable to improper authorization on debug and artifact file downloads" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-36826", "datePublished": "2023-07-25T18:50:42.350Z", "dateReserved": "2023-06-27T15:43:18.388Z", "dateUpdated": "2024-10-03T19:25:30.691Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-45605
Vulnerability from cvelistv5
Published
2024-09-17 19:44
Modified
2024-09-18 13:19
Severity ?
EPSS score ?
Summary
Sentry is a developer-first error tracking and performance monitoring platform. An authenticated user delete the user issue alert notifications for arbitrary users given a know alert ID. A patch was issued to ensure authorization checks are properly scoped on requests to delete user alert notifications. Sentry SaaS users do not need to take any action. Self-Hosted Sentry users should upgrade to version 24.9.0 or higher. There are no known workarounds for this vulnerability.
References
▼ | URL | Tags |
---|---|---|
https://github.com/getsentry/sentry/security/advisories/GHSA-54m3-95j9-v89j | x_refsource_CONFIRM | |
https://github.com/getsentry/sentry/pull/77093 | x_refsource_MISC | |
https://github.com/getsentry/self-hosted | x_refsource_MISC |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-45605", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-18T13:19:19.399502Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-18T13:19:27.312Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "sentry", "vendor": "getsentry", "versions": [ { "status": "affected", "version": "\u003e=23.9.0, \u003c 24.9.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Sentry is a developer-first error tracking and performance monitoring platform. An authenticated user delete the user issue alert notifications for arbitrary users given a know alert ID. A patch was issued to ensure authorization checks are properly scoped on requests to delete user alert notifications. Sentry SaaS users do not need to take any action. Self-Hosted Sentry users should upgrade to version 24.9.0 or higher. There are no known workarounds for this vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-639", "description": "CWE-639: Authorization Bypass Through User-Controlled Key", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-17T19:44:50.664Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/getsentry/sentry/security/advisories/GHSA-54m3-95j9-v89j", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/getsentry/sentry/security/advisories/GHSA-54m3-95j9-v89j" }, { "name": "https://github.com/getsentry/sentry/pull/77093", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/getsentry/sentry/pull/77093" }, { "name": "https://github.com/getsentry/self-hosted", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/getsentry/self-hosted" } ], "source": { "advisory": "GHSA-54m3-95j9-v89j", "discovery": "UNKNOWN" }, "title": "Improper authorization on deletion of user issue alert notifications in sentry" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-45605", "datePublished": "2024-09-17T19:44:50.664Z", "dateReserved": "2024-09-02T16:00:02.424Z", "dateUpdated": "2024-09-18T13:19:27.312Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-23485
Vulnerability from cvelistv5
Published
2022-12-10 00:40
Modified
2024-08-03 03:43
Severity ?
EPSS score ?
Summary
Sentry is an error tracking and performance monitoring platform. In versions of the sentry python library prior to 22.11.0 an attacker with a known valid invite link could manipulate a cookie to allow the same invite link to be reused on multiple accounts when joining an organization. As a result an attacker with a valid invite link can create multiple users and join an organization they may not have been originally invited to. This issue was patched in version 22.11.0. Sentry SaaS customers do not need to take action. Self-hosted Sentry installs on systems which can not upgrade can disable the invite functionality until they are ready to deploy the patched version by editing their `sentry.conf.py` file (usually located at `~/.sentry/`).
References
▼ | URL | Tags |
---|---|---|
https://github.com/getsentry/sentry/security/advisories/GHSA-jv85-mqxj-3f9j | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T03:43:46.116Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/getsentry/sentry/security/advisories/GHSA-jv85-mqxj-3f9j", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/getsentry/sentry/security/advisories/GHSA-jv85-mqxj-3f9j" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "sentry", "vendor": "getsentry", "versions": [ { "status": "affected", "version": "\u003e= 20.6.0, \u003c 22.11.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Sentry is an error tracking and performance monitoring platform. In versions of the sentry python library prior to 22.11.0 an attacker with a known valid invite link could manipulate a cookie to allow the same invite link to be reused on multiple accounts when joining an organization. As a result an attacker with a valid invite link can create multiple users and join an organization they may not have been originally invited to. This issue was patched in version 22.11.0. Sentry SaaS customers do not need to take action. Self-hosted Sentry installs on systems which can not upgrade can disable the invite functionality until they are ready to deploy the patched version by editing their `sentry.conf.py` file (usually located at `~/.sentry/`).\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269: Improper Privilege Management", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284: Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-10T00:40:46.301Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/getsentry/sentry/security/advisories/GHSA-jv85-mqxj-3f9j", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/getsentry/sentry/security/advisories/GHSA-jv85-mqxj-3f9j" } ], "source": { "advisory": "GHSA-jv85-mqxj-3f9j", "discovery": "UNKNOWN" }, "title": "Invite code reuse via cookie manipulation in sentry" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-23485", "datePublished": "2022-12-10T00:40:46.301Z", "dateReserved": "2022-01-19T21:23:53.761Z", "dateUpdated": "2024-08-03T03:43:46.116Z", "requesterUserId": "c184a3d9-dc98-4c48-a45b-d2d88cf0ac74", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-53253
Vulnerability from cvelistv5
Published
2024-11-22 19:58
Modified
2024-11-25 21:48
Severity ?
EPSS score ?
Summary
Sentry is an error tracking and performance monitoring platform. Version 24.11.0, and only version 24.11.0, is vulnerable to a scenario where a specific error message generated by the Sentry platform could include a plaintext Client ID and Client Secret for an application integration. The Client ID and Client Secret would not be displayed in the UI, but would be returned in the underlying HTTP response to the end user. This could occur under the following conditions: An app installation made use of a Search UI component with the `async` flag set to true (default: true); auser types types into the Search Component which creates a request to the third-party for search or query results; and that third-party response may then fail validation and Sentry would return the `select-requester.invalid-response` error code along with a serialized version of a Sentry application containing the integration Client Secret. Should this error be found, it's reasonable to assume the potential exposure of an integration Client Secret. However, an ID and Secret pair alone does not provide direct access to any data. For that secret to be abused an attacker would also need to obtain a valid API token for a Sentry application.
Sentry SaaS users do not need to take any action. For Sentry SaaS users, only a single application integration was impacted and the owner has rotated their Client Secret. No abuse of the leaked Client Secret has occurred.
As of time of publication, a fix is available for users of Sentry self-hosted in pull request 81038. Sentry self-hosted does not ship with any application integrations. This could only impact self-hosted users that maintain their own integrations. In that case, search for a `select-requester.invalid-response` event. Please note that this error was also shared with another event unrelated to this advisory so Sentry self-hosted users will also need to review the parameters logged for each named event. Sentry self-hosted users may review `select_requester.py` for the instances where these errors can be generated. With the security fix this is no longer a shared event type. Sentry self-hosted users may not install version 24.11.0 and instead wait for the next release. Self-hosted instance that are already running the affected version may consider downgrading to to 24.10.0.
References
▼ | URL | Tags |
---|---|---|
https://github.com/getsentry/sentry/security/advisories/GHSA-v5h2-q2w4-gpcx | x_refsource_CONFIRM | |
https://github.com/getsentry/sentry/pull/79377 | x_refsource_MISC | |
https://github.com/getsentry/sentry/pull/81038 | x_refsource_MISC |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:getsentry:sentry:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "sentry", "vendor": "getsentry", "versions": [ { "status": "affected", "version": "24.11.0" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-53253", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-25T21:46:12.128220Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-25T21:48:26.206Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "sentry", "vendor": "getsentry", "versions": [ { "status": "affected", "version": "= 24.11.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Sentry is an error tracking and performance monitoring platform. Version 24.11.0, and only version 24.11.0, is vulnerable to a scenario where a specific error message generated by the Sentry platform could include a plaintext Client ID and Client Secret for an application integration. The Client ID and Client Secret would not be displayed in the UI, but would be returned in the underlying HTTP response to the end user. This could occur under the following conditions: An app installation made use of a Search UI component with the `async` flag set to true (default: true); auser types types into the Search Component which creates a request to the third-party for search or query results; and that third-party response may then fail validation and Sentry would return the `select-requester.invalid-response` error code along with a serialized version of a Sentry application containing the integration Client Secret. Should this error be found, it\u0027s reasonable to assume the potential exposure of an integration Client Secret. However, an ID and Secret pair alone does not provide direct access to any data. For that secret to be abused an attacker would also need to obtain a valid API token for a Sentry application. \n\nSentry SaaS users do not need to take any action. For Sentry SaaS users, only a single application integration was impacted and the owner has rotated their Client Secret. No abuse of the leaked Client Secret has occurred.\n\nAs of time of publication, a fix is available for users of Sentry self-hosted in pull request 81038. Sentry self-hosted does not ship with any application integrations. This could only impact self-hosted users that maintain their own integrations. In that case, search for a `select-requester.invalid-response` event. Please note that this error was also shared with another event unrelated to this advisory so Sentry self-hosted users will also need to review the parameters logged for each named event. Sentry self-hosted users may review `select_requester.py` for the instances where these errors can be generated. With the security fix this is no longer a shared event type. Sentry self-hosted users may not install version 24.11.0 and instead wait for the next release. Self-hosted instance that are already running the affected version may consider downgrading to to 24.10.0." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-209", "description": "CWE-209: Generation of Error Message Containing Sensitive Information", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-22T19:58:55.886Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/getsentry/sentry/security/advisories/GHSA-v5h2-q2w4-gpcx", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/getsentry/sentry/security/advisories/GHSA-v5h2-q2w4-gpcx" }, { "name": "https://github.com/getsentry/sentry/pull/79377", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/getsentry/sentry/pull/79377" }, { "name": "https://github.com/getsentry/sentry/pull/81038", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/getsentry/sentry/pull/81038" } ], "source": { "advisory": "GHSA-v5h2-q2w4-gpcx", "discovery": "UNKNOWN" }, "title": "Sentry\u0027s improper error handling leaks Application Integration Client Secret" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-53253", "datePublished": "2024-11-22T19:58:55.886Z", "dateReserved": "2024-11-19T20:08:14.479Z", "dateUpdated": "2024-11-25T21:48:26.206Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-32474
Vulnerability from cvelistv5
Published
2024-04-18 19:50
Modified
2024-08-02 02:13
Severity ?
EPSS score ?
Summary
Sentry is an error tracking and performance monitoring platform. Prior to 24.4.1, when authenticating as a superuser to Sentry with a username and password, the password is leaked as cleartext in logs under the _event_: `auth-index.validate_superuser`. An attacker with access to the log data could use these leaked credentials to login to the Sentry system as superuser. Self-hosted users on affected versions should upgrade to 24.4.1 or later. Users can configure the logging level to exclude logs of the `INFO` level and only generate logs for levels at `WARNING` or more.
References
▼ | URL | Tags |
---|---|---|
https://github.com/getsentry/sentry/security/advisories/GHSA-6cjm-4pxw-7xp9 | x_refsource_CONFIRM | |
https://github.com/getsentry/sentry/pull/66393 | x_refsource_MISC | |
https://github.com/getsentry/sentry/pull/69148 | x_refsource_MISC | |
https://github.com/getsentry/sentry/commit/d5b34568d9f1c41362ccb62141532a0a2169512f | x_refsource_MISC |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:getsentry:sentry:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "sentry", "vendor": "getsentry", "versions": [ { "lessThanOrEqual": "24.4.1", "status": "affected", "version": "24.3.0", "versionType": "semver" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-32474", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-04-23T14:22:52.411069Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:51:26.370Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T02:13:39.118Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/getsentry/sentry/security/advisories/GHSA-6cjm-4pxw-7xp9", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/getsentry/sentry/security/advisories/GHSA-6cjm-4pxw-7xp9" }, { "name": "https://github.com/getsentry/sentry/pull/66393", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/getsentry/sentry/pull/66393" }, { "name": "https://github.com/getsentry/sentry/pull/69148", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/getsentry/sentry/pull/69148" }, { "name": "https://github.com/getsentry/sentry/commit/d5b34568d9f1c41362ccb62141532a0a2169512f", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/getsentry/sentry/commit/d5b34568d9f1c41362ccb62141532a0a2169512f" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "sentry", "vendor": "getsentry", "versions": [ { "status": "affected", "version": "\u003e= 24.3.0, \u003c 24.4.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Sentry is an error tracking and performance monitoring platform. Prior to 24.4.1, when authenticating as a superuser to Sentry with a username and password, the password is leaked as cleartext in logs under the _event_: `auth-index.validate_superuser`. An attacker with access to the log data could use these leaked credentials to login to the Sentry system as superuser. Self-hosted users on affected versions should upgrade to 24.4.1 or later. Users can configure the logging level to exclude logs of the `INFO` level and only generate logs for levels at `WARNING` or more." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-312", "description": "CWE-312: Cleartext Storage of Sensitive Information", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-117", "description": "CWE-117: Improper Output Neutralization for Logs", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-18T19:50:44.541Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/getsentry/sentry/security/advisories/GHSA-6cjm-4pxw-7xp9", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/getsentry/sentry/security/advisories/GHSA-6cjm-4pxw-7xp9" }, { "name": "https://github.com/getsentry/sentry/pull/66393", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/getsentry/sentry/pull/66393" }, { "name": "https://github.com/getsentry/sentry/pull/69148", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/getsentry/sentry/pull/69148" }, { "name": "https://github.com/getsentry/sentry/commit/d5b34568d9f1c41362ccb62141532a0a2169512f", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/getsentry/sentry/commit/d5b34568d9f1c41362ccb62141532a0a2169512f" } ], "source": { "advisory": "GHSA-6cjm-4pxw-7xp9", "discovery": "UNKNOWN" }, "title": "Sentry\u0027s superuser cleartext password leaked in logs" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-32474", "datePublished": "2024-04-18T19:50:44.541Z", "dateReserved": "2024-04-12T19:41:51.167Z", "dateUpdated": "2024-08-02T02:13:39.118Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-24829
Vulnerability from cvelistv5
Published
2024-02-08 23:44
Modified
2024-08-01 23:28
Severity ?
EPSS score ?
Summary
Sentry is an error tracking and performance monitoring platform. Sentry’s integration platform provides a way for external services to interact with Sentry. One of such integrations, the Phabricator integration (maintained by Sentry) with version <=24.1.1 contains a constrained SSRF vulnerability. An attacker could make Sentry send POST HTTP requests to arbitrary URLs (including internal IP addresses) by providing an unsanitized input to the Phabricator integration. However, the body payload is constrained to a specific format. If an attacker has access to a Sentry instance, this allows them to: 1. interact with internal network; 2. scan local/remote ports. This issue has been fixed in Sentry self-hosted release 24.1.2, and has already been mitigated on sentry.io on February 8. Users are advised to upgrade. There are no known workarounds for this vulnerability.
References
▼ | URL | Tags |
---|---|---|
https://github.com/getsentry/sentry/security/advisories/GHSA-rqxh-fp9p-p98r | x_refsource_CONFIRM | |
https://github.com/getsentry/sentry/pull/64882 | x_refsource_MISC | |
https://github.com/getsentry/self-hosted/releases/tag/24.1.2 | x_refsource_MISC |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-24829", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-02-09T19:23:50.940961Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-05T17:20:49.165Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T23:28:12.936Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/getsentry/sentry/security/advisories/GHSA-rqxh-fp9p-p98r", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/getsentry/sentry/security/advisories/GHSA-rqxh-fp9p-p98r" }, { "name": "https://github.com/getsentry/sentry/pull/64882", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/getsentry/sentry/pull/64882" }, { "name": "https://github.com/getsentry/self-hosted/releases/tag/24.1.2", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/getsentry/self-hosted/releases/tag/24.1.2" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "sentry", "vendor": "getsentry", "versions": [ { "status": "affected", "version": "\u003e= 9.1.0, \u003c 24.1.2" } ] } ], "descriptions": [ { "lang": "en", "value": "Sentry is an error tracking and performance monitoring platform. Sentry\u2019s integration platform provides a way for external services to interact with Sentry. One of such integrations, the Phabricator integration (maintained by Sentry) with version \u003c=24.1.1 contains a constrained SSRF vulnerability. An attacker could make Sentry send POST HTTP requests to arbitrary URLs (including internal IP addresses) by providing an unsanitized input to the Phabricator integration. However, the body payload is constrained to a specific format. If an attacker has access to a Sentry instance, this allows them to: 1. interact with internal network; 2. scan local/remote ports. This issue has been fixed in Sentry self-hosted release 24.1.2, and has already been mitigated on sentry.io on February 8. Users are advised to upgrade. There are no known workarounds for this vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-918", "description": "CWE-918: Server-Side Request Forgery (SSRF)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-08T23:44:07.676Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/getsentry/sentry/security/advisories/GHSA-rqxh-fp9p-p98r", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/getsentry/sentry/security/advisories/GHSA-rqxh-fp9p-p98r" }, { "name": "https://github.com/getsentry/sentry/pull/64882", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/getsentry/sentry/pull/64882" }, { "name": "https://github.com/getsentry/self-hosted/releases/tag/24.1.2", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/getsentry/self-hosted/releases/tag/24.1.2" } ], "source": { "advisory": "GHSA-rqxh-fp9p-p98r", "discovery": "UNKNOWN" }, "title": "SSRF in Sentry via Phabricator integration" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-24829", "datePublished": "2024-02-08T23:44:07.676Z", "dateReserved": "2024-01-31T16:28:17.947Z", "dateUpdated": "2024-08-01T23:28:12.936Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39349
Vulnerability from cvelistv5
Published
2023-08-07 18:27
Modified
2024-10-04 19:12
Severity ?
EPSS score ?
Summary
Sentry is an error tracking and performance monitoring platform. Starting in version 22.1.0 and prior to version 23.7.2, an attacker with access to a token with few or no scopes can query `/api/0/api-tokens/` for a list of all tokens created by a user, including tokens with greater scopes, and use those tokens in other requests. There is no evidence that the issue was exploited on `sentry.io`. For self-hosted users, it is advised to rotate user auth tokens. A fix is available in version 23.7.2 of `sentry` and `self-hosted`. There are no known workarounds.
References
▼ | URL | Tags |
---|---|---|
https://github.com/getsentry/sentry/security/advisories/GHSA-9jcq-jf57-c62c | x_refsource_CONFIRM | |
https://github.com/getsentry/sentry/pull/53850 | x_refsource_MISC | |
https://github.com/getsentry/sentry/commit/fad12c1150d1135edf9666ea72ca11bc110c1083 | x_refsource_MISC | |
https://github.com/getsentry/self-hosted/releases/tag/23.7.2 | x_refsource_MISC | |
https://github.com/getsentry/sentry/releases/tag/23.7.2 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:02:06.994Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/getsentry/sentry/security/advisories/GHSA-9jcq-jf57-c62c", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/getsentry/sentry/security/advisories/GHSA-9jcq-jf57-c62c" }, { "name": "https://github.com/getsentry/sentry/pull/53850", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/getsentry/sentry/pull/53850" }, { "name": "https://github.com/getsentry/sentry/commit/fad12c1150d1135edf9666ea72ca11bc110c1083", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/getsentry/sentry/commit/fad12c1150d1135edf9666ea72ca11bc110c1083" }, { "name": "https://github.com/getsentry/self-hosted/releases/tag/23.7.2", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/getsentry/self-hosted/releases/tag/23.7.2" }, { "name": "https://github.com/getsentry/sentry/releases/tag/23.7.2", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/getsentry/sentry/releases/tag/23.7.2" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:getsentry:sentry:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "sentry", "vendor": "getsentry", "versions": [ { "lessThan": "23.7.2", "status": "affected", "version": "22.1.0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-39349", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-04T18:24:29.865480Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-04T19:12:12.595Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "sentry", "vendor": "getsentry", "versions": [ { "status": "affected", "version": "\u003e= 22.1.0, \u003c 23.7.2" } ] } ], "descriptions": [ { "lang": "en", "value": "Sentry is an error tracking and performance monitoring platform. Starting in version 22.1.0 and prior to version 23.7.2, an attacker with access to a token with few or no scopes can query `/api/0/api-tokens/` for a list of all tokens created by a user, including tokens with greater scopes, and use those tokens in other requests. There is no evidence that the issue was exploited on `sentry.io`. For self-hosted users, it is advised to rotate user auth tokens. A fix is available in version 23.7.2 of `sentry` and `self-hosted`. There are no known workarounds." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284: Improper Access Control", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-287", "description": "CWE-287: Improper Authentication", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-07T18:27:12.396Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/getsentry/sentry/security/advisories/GHSA-9jcq-jf57-c62c", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/getsentry/sentry/security/advisories/GHSA-9jcq-jf57-c62c" }, { "name": "https://github.com/getsentry/sentry/pull/53850", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/getsentry/sentry/pull/53850" }, { "name": "https://github.com/getsentry/sentry/commit/fad12c1150d1135edf9666ea72ca11bc110c1083", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/getsentry/sentry/commit/fad12c1150d1135edf9666ea72ca11bc110c1083" }, { "name": "https://github.com/getsentry/self-hosted/releases/tag/23.7.2", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/getsentry/self-hosted/releases/tag/23.7.2" }, { "name": "https://github.com/getsentry/sentry/releases/tag/23.7.2", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/getsentry/sentry/releases/tag/23.7.2" } ], "source": { "advisory": "GHSA-9jcq-jf57-c62c", "discovery": "UNKNOWN" }, "title": "Sentry vulnerable to privilege escalation via ApiTokensEndpoint" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-39349", "datePublished": "2023-08-07T18:27:12.396Z", "dateReserved": "2023-07-28T13:26:46.477Z", "dateUpdated": "2024-10-04T19:12:12.595Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }