Vulnerabilites related to sentry - sentry
CVE-2024-45605 (GCVE-0-2024-45605)
Vulnerability from cvelistv5
Published
2024-09-17 19:44
Modified
2024-09-18 13:19
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-639 - Authorization Bypass Through User-Controlled Key
Summary
Sentry is a developer-first error tracking and performance monitoring platform. An authenticated user delete the user issue alert notifications for arbitrary users given a know alert ID. A patch was issued to ensure authorization checks are properly scoped on requests to delete user alert notifications. Sentry SaaS users do not need to take any action. Self-Hosted Sentry users should upgrade to version 24.9.0 or higher. There are no known workarounds for this vulnerability.
References
▼ | URL | Tags |
---|---|---|
https://github.com/getsentry/sentry/security/advisories/GHSA-54m3-95j9-v89j | x_refsource_CONFIRM | |
https://github.com/getsentry/sentry/pull/77093 | x_refsource_MISC | |
https://github.com/getsentry/self-hosted | x_refsource_MISC |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-45605", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-18T13:19:19.399502Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-18T13:19:27.312Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "sentry", "vendor": "getsentry", "versions": [ { "status": "affected", "version": "\u003e=23.9.0, \u003c 24.9.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Sentry is a developer-first error tracking and performance monitoring platform. An authenticated user delete the user issue alert notifications for arbitrary users given a know alert ID. A patch was issued to ensure authorization checks are properly scoped on requests to delete user alert notifications. Sentry SaaS users do not need to take any action. Self-Hosted Sentry users should upgrade to version 24.9.0 or higher. There are no known workarounds for this vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-639", "description": "CWE-639: Authorization Bypass Through User-Controlled Key", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-17T19:44:50.664Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/getsentry/sentry/security/advisories/GHSA-54m3-95j9-v89j", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/getsentry/sentry/security/advisories/GHSA-54m3-95j9-v89j" }, { "name": "https://github.com/getsentry/sentry/pull/77093", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/getsentry/sentry/pull/77093" }, { "name": "https://github.com/getsentry/self-hosted", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/getsentry/self-hosted" } ], "source": { "advisory": "GHSA-54m3-95j9-v89j", "discovery": "UNKNOWN" }, "title": "Improper authorization on deletion of user issue alert notifications in sentry" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-45605", "datePublished": "2024-09-17T19:44:50.664Z", "dateReserved": "2024-09-02T16:00:02.424Z", "dateUpdated": "2024-09-18T13:19:27.312Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-53253 (GCVE-0-2024-53253)
Vulnerability from cvelistv5
Published
2024-11-22 19:58
Modified
2024-11-25 21:48
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-209 - Generation of Error Message Containing Sensitive Information
Summary
Sentry is an error tracking and performance monitoring platform. Version 24.11.0, and only version 24.11.0, is vulnerable to a scenario where a specific error message generated by the Sentry platform could include a plaintext Client ID and Client Secret for an application integration. The Client ID and Client Secret would not be displayed in the UI, but would be returned in the underlying HTTP response to the end user. This could occur under the following conditions: An app installation made use of a Search UI component with the `async` flag set to true (default: true); auser types types into the Search Component which creates a request to the third-party for search or query results; and that third-party response may then fail validation and Sentry would return the `select-requester.invalid-response` error code along with a serialized version of a Sentry application containing the integration Client Secret. Should this error be found, it's reasonable to assume the potential exposure of an integration Client Secret. However, an ID and Secret pair alone does not provide direct access to any data. For that secret to be abused an attacker would also need to obtain a valid API token for a Sentry application.
Sentry SaaS users do not need to take any action. For Sentry SaaS users, only a single application integration was impacted and the owner has rotated their Client Secret. No abuse of the leaked Client Secret has occurred.
As of time of publication, a fix is available for users of Sentry self-hosted in pull request 81038. Sentry self-hosted does not ship with any application integrations. This could only impact self-hosted users that maintain their own integrations. In that case, search for a `select-requester.invalid-response` event. Please note that this error was also shared with another event unrelated to this advisory so Sentry self-hosted users will also need to review the parameters logged for each named event. Sentry self-hosted users may review `select_requester.py` for the instances where these errors can be generated. With the security fix this is no longer a shared event type. Sentry self-hosted users may not install version 24.11.0 and instead wait for the next release. Self-hosted instance that are already running the affected version may consider downgrading to to 24.10.0.
References
▼ | URL | Tags |
---|---|---|
https://github.com/getsentry/sentry/security/advisories/GHSA-v5h2-q2w4-gpcx | x_refsource_CONFIRM | |
https://github.com/getsentry/sentry/pull/79377 | x_refsource_MISC | |
https://github.com/getsentry/sentry/pull/81038 | x_refsource_MISC |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:getsentry:sentry:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "sentry", "vendor": "getsentry", "versions": [ { "status": "affected", "version": "24.11.0" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-53253", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-25T21:46:12.128220Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-25T21:48:26.206Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "sentry", "vendor": "getsentry", "versions": [ { "status": "affected", "version": "= 24.11.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Sentry is an error tracking and performance monitoring platform. Version 24.11.0, and only version 24.11.0, is vulnerable to a scenario where a specific error message generated by the Sentry platform could include a plaintext Client ID and Client Secret for an application integration. The Client ID and Client Secret would not be displayed in the UI, but would be returned in the underlying HTTP response to the end user. This could occur under the following conditions: An app installation made use of a Search UI component with the `async` flag set to true (default: true); auser types types into the Search Component which creates a request to the third-party for search or query results; and that third-party response may then fail validation and Sentry would return the `select-requester.invalid-response` error code along with a serialized version of a Sentry application containing the integration Client Secret. Should this error be found, it\u0027s reasonable to assume the potential exposure of an integration Client Secret. However, an ID and Secret pair alone does not provide direct access to any data. For that secret to be abused an attacker would also need to obtain a valid API token for a Sentry application. \n\nSentry SaaS users do not need to take any action. For Sentry SaaS users, only a single application integration was impacted and the owner has rotated their Client Secret. No abuse of the leaked Client Secret has occurred.\n\nAs of time of publication, a fix is available for users of Sentry self-hosted in pull request 81038. Sentry self-hosted does not ship with any application integrations. This could only impact self-hosted users that maintain their own integrations. In that case, search for a `select-requester.invalid-response` event. Please note that this error was also shared with another event unrelated to this advisory so Sentry self-hosted users will also need to review the parameters logged for each named event. Sentry self-hosted users may review `select_requester.py` for the instances where these errors can be generated. With the security fix this is no longer a shared event type. Sentry self-hosted users may not install version 24.11.0 and instead wait for the next release. Self-hosted instance that are already running the affected version may consider downgrading to to 24.10.0." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-209", "description": "CWE-209: Generation of Error Message Containing Sensitive Information", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-22T19:58:55.886Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/getsentry/sentry/security/advisories/GHSA-v5h2-q2w4-gpcx", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/getsentry/sentry/security/advisories/GHSA-v5h2-q2w4-gpcx" }, { "name": "https://github.com/getsentry/sentry/pull/79377", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/getsentry/sentry/pull/79377" }, { "name": "https://github.com/getsentry/sentry/pull/81038", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/getsentry/sentry/pull/81038" } ], "source": { "advisory": "GHSA-v5h2-q2w4-gpcx", "discovery": "UNKNOWN" }, "title": "Sentry\u0027s improper error handling leaks Application Integration Client Secret" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-53253", "datePublished": "2024-11-22T19:58:55.886Z", "dateReserved": "2024-11-19T20:08:14.479Z", "dateUpdated": "2024-11-25T21:48:26.206Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-39349 (GCVE-0-2023-39349)
Vulnerability from cvelistv5
Published
2023-08-07 18:27
Modified
2024-10-04 19:12
Severity ?
VLAI Severity ?
EPSS score ?
Summary
Sentry is an error tracking and performance monitoring platform. Starting in version 22.1.0 and prior to version 23.7.2, an attacker with access to a token with few or no scopes can query `/api/0/api-tokens/` for a list of all tokens created by a user, including tokens with greater scopes, and use those tokens in other requests. There is no evidence that the issue was exploited on `sentry.io`. For self-hosted users, it is advised to rotate user auth tokens. A fix is available in version 23.7.2 of `sentry` and `self-hosted`. There are no known workarounds.
References
▼ | URL | Tags |
---|---|---|
https://github.com/getsentry/sentry/security/advisories/GHSA-9jcq-jf57-c62c | x_refsource_CONFIRM | |
https://github.com/getsentry/sentry/pull/53850 | x_refsource_MISC | |
https://github.com/getsentry/sentry/commit/fad12c1150d1135edf9666ea72ca11bc110c1083 | x_refsource_MISC | |
https://github.com/getsentry/self-hosted/releases/tag/23.7.2 | x_refsource_MISC | |
https://github.com/getsentry/sentry/releases/tag/23.7.2 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:02:06.994Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/getsentry/sentry/security/advisories/GHSA-9jcq-jf57-c62c", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/getsentry/sentry/security/advisories/GHSA-9jcq-jf57-c62c" }, { "name": "https://github.com/getsentry/sentry/pull/53850", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/getsentry/sentry/pull/53850" }, { "name": "https://github.com/getsentry/sentry/commit/fad12c1150d1135edf9666ea72ca11bc110c1083", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/getsentry/sentry/commit/fad12c1150d1135edf9666ea72ca11bc110c1083" }, { "name": "https://github.com/getsentry/self-hosted/releases/tag/23.7.2", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/getsentry/self-hosted/releases/tag/23.7.2" }, { "name": "https://github.com/getsentry/sentry/releases/tag/23.7.2", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/getsentry/sentry/releases/tag/23.7.2" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:getsentry:sentry:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "sentry", "vendor": "getsentry", "versions": [ { "lessThan": "23.7.2", "status": "affected", "version": "22.1.0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-39349", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-04T18:24:29.865480Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-04T19:12:12.595Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "sentry", "vendor": "getsentry", "versions": [ { "status": "affected", "version": "\u003e= 22.1.0, \u003c 23.7.2" } ] } ], "descriptions": [ { "lang": "en", "value": "Sentry is an error tracking and performance monitoring platform. Starting in version 22.1.0 and prior to version 23.7.2, an attacker with access to a token with few or no scopes can query `/api/0/api-tokens/` for a list of all tokens created by a user, including tokens with greater scopes, and use those tokens in other requests. There is no evidence that the issue was exploited on `sentry.io`. For self-hosted users, it is advised to rotate user auth tokens. A fix is available in version 23.7.2 of `sentry` and `self-hosted`. There are no known workarounds." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284: Improper Access Control", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-287", "description": "CWE-287: Improper Authentication", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-07T18:27:12.396Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/getsentry/sentry/security/advisories/GHSA-9jcq-jf57-c62c", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/getsentry/sentry/security/advisories/GHSA-9jcq-jf57-c62c" }, { "name": "https://github.com/getsentry/sentry/pull/53850", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/getsentry/sentry/pull/53850" }, { "name": "https://github.com/getsentry/sentry/commit/fad12c1150d1135edf9666ea72ca11bc110c1083", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/getsentry/sentry/commit/fad12c1150d1135edf9666ea72ca11bc110c1083" }, { "name": "https://github.com/getsentry/self-hosted/releases/tag/23.7.2", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/getsentry/self-hosted/releases/tag/23.7.2" }, { "name": "https://github.com/getsentry/sentry/releases/tag/23.7.2", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/getsentry/sentry/releases/tag/23.7.2" } ], "source": { "advisory": "GHSA-9jcq-jf57-c62c", "discovery": "UNKNOWN" }, "title": "Sentry vulnerable to privilege escalation via ApiTokensEndpoint" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-39349", "datePublished": "2023-08-07T18:27:12.396Z", "dateReserved": "2023-07-28T13:26:46.477Z", "dateUpdated": "2024-10-04T19:12:12.595Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-53073 (GCVE-0-2025-53073)
Vulnerability from cvelistv5
Published
2025-06-24 00:00
Modified
2025-06-24 19:18
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-425 - Direct Request ('Forced Browsing')
Summary
In Sentry 25.1.0 through 25.5.1, an authenticated attacker can access a project's issue endpoint and perform unauthorized actions (such as adding a comment) without being a member of the project's team. A seven-digit issue ID must be known (it is not treated as a secret and might be mentioned publicly, or it could be predicted).
References
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-53073", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-06-24T19:18:05.310947Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-24T19:18:26.715Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Sentry", "vendor": "Sentry", "versions": [ { "lessThanOrEqual": "25.5.1", "status": "affected", "version": "25.1.0", "versionType": "semver" } ] } ], "cpeApplicability": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sentry:sentry:*:*:*:*:*:*:*:*", "versionEndIncluding": "25.5.1", "versionStartIncluding": "25.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "descriptions": [ { "lang": "en", "value": "In Sentry 25.1.0 through 25.5.1, an authenticated attacker can access a project\u0027s issue endpoint and perform unauthorized actions (such as adding a comment) without being a member of the project\u0027s team. A seven-digit issue ID must be known (it is not treated as a secret and might be mentioned publicly, or it could be predicted)." } ], "metrics": [ { "cvssV3_1": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-425", "description": "CWE-425 Direct Request (\u0027Forced Browsing\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-24T17:28:58.878Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://github.com/nikolas-ch/CVEs/tree/main/Sentry_Version%3E%3D25.1.0" }, { "url": "https://github.com/nikolas-ch/CVEs/blob/main/Sentry_Version%3E%3D25.1.0/Sentry_%3E%3D25.1.0_WeakAuthorizationControl.txt" }, { "url": "https://github.com/getsentry/self-hosted/releases" } ], "x_generator": { "engine": "enrichogram 0.0.1" } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2025-53073", "datePublished": "2025-06-24T00:00:00.000Z", "dateReserved": "2025-06-24T00:00:00.000Z", "dateUpdated": "2025-06-24T19:18:26.715Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-36826 (GCVE-0-2023-36826)
Vulnerability from cvelistv5
Published
2023-07-25 18:50
Modified
2024-10-03 19:25
Severity ?
VLAI Severity ?
EPSS score ?
Summary
Sentry is an error tracking and performance monitoring platform. Starting in version 8.21.0 and prior to version 23.5.2, an authenticated user can download a debug or artifact bundle from arbitrary organizations and projects with a known bundle ID. The user does not need to be a member of the organization or have permissions on the project. A patch was issued in version 23.5.2 to ensure authorization checks are properly scoped on requests to retrieve debug or artifact bundles. Authenticated users who do not have the necessary permissions on the particular project are no longer able to download them. Sentry SaaS users do not need to take any action. Self-Hosted Sentry users should upgrade to version 23.5.2 or higher.
References
▼ | URL | Tags |
---|---|---|
https://github.com/getsentry/sentry/security/advisories/GHSA-m4hc-m2v6-hfw8 | x_refsource_CONFIRM | |
https://github.com/getsentry/sentry/pull/49680 | x_refsource_MISC | |
https://github.com/getsentry/sentry/commit/e932b15435bf36239431eaa3790a6bcfa47046a9 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T17:01:09.754Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/getsentry/sentry/security/advisories/GHSA-m4hc-m2v6-hfw8", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/getsentry/sentry/security/advisories/GHSA-m4hc-m2v6-hfw8" }, { "name": "https://github.com/getsentry/sentry/pull/49680", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/getsentry/sentry/pull/49680" }, { "name": "https://github.com/getsentry/sentry/commit/e932b15435bf36239431eaa3790a6bcfa47046a9", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/getsentry/sentry/commit/e932b15435bf36239431eaa3790a6bcfa47046a9" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-36826", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-03T19:25:05.837092Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-03T19:25:30.691Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "sentry", "vendor": "getsentry", "versions": [ { "status": "affected", "version": "\u003e= 8.21.0, \u003c 23.5.2" } ] } ], "descriptions": [ { "lang": "en", "value": "Sentry is an error tracking and performance monitoring platform. Starting in version 8.21.0 and prior to version 23.5.2, an authenticated user can download a debug or artifact bundle from arbitrary organizations and projects with a known bundle ID. The user does not need to be a member of the organization or have permissions on the project. A patch was issued in version 23.5.2 to ensure authorization checks are properly scoped on requests to retrieve debug or artifact bundles. Authenticated users who do not have the necessary permissions on the particular project are no longer able to download them. Sentry SaaS users do not need to take any action. Self-Hosted Sentry users should upgrade to version 23.5.2 or higher." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-285", "description": "CWE-285: Improper Authorization", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-863", "description": "CWE-863: Incorrect Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-25T18:50:42.350Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/getsentry/sentry/security/advisories/GHSA-m4hc-m2v6-hfw8", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/getsentry/sentry/security/advisories/GHSA-m4hc-m2v6-hfw8" }, { "name": "https://github.com/getsentry/sentry/pull/49680", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/getsentry/sentry/pull/49680" }, { "name": "https://github.com/getsentry/sentry/commit/e932b15435bf36239431eaa3790a6bcfa47046a9", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/getsentry/sentry/commit/e932b15435bf36239431eaa3790a6bcfa47046a9" } ], "source": { "advisory": "GHSA-m4hc-m2v6-hfw8", "discovery": "UNKNOWN" }, "title": "Sentry vulnerable to improper authorization on debug and artifact file downloads" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-36826", "datePublished": "2023-07-25T18:50:42.350Z", "dateReserved": "2023-06-27T15:43:18.388Z", "dateUpdated": "2024-10-03T19:25:30.691Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-45606 (GCVE-0-2024-45606)
Vulnerability from cvelistv5
Published
2024-09-17 19:43
Modified
2024-09-18 13:20
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-639 - Authorization Bypass Through User-Controlled Key
Summary
Sentry is a developer-first error tracking and performance monitoring platform. An authenticated user can mute alert rules from arbitrary organizations and projects with a know rule ID. The user does not need to be a member of the organization or have permissions on the project. In our review, we have identified no instances where alerts have been muted by unauthorized parties. A patch was issued to ensure authorization checks are properly scoped on requests to mute alert rules. Authenticated users who do not have the necessary permissions are no longer able to mute alerts. Sentry SaaS users do not need to take any action. Self-Hosted Sentry users should upgrade to version **24.9.0** or higher. The rule mute feature was generally available as of 23.6.0 but users with early access may have had the feature as of 23.4.0. Affected users are advised to upgrade to version 24.9.0. There are no known workarounds for this vulnerability.
References
▼ | URL | Tags |
---|---|---|
https://github.com/getsentry/sentry/security/advisories/GHSA-v345-w9f2-mpm5 | x_refsource_CONFIRM | |
https://github.com/getsentry/sentry/pull/77016 | x_refsource_MISC | |
https://github.com/getsentry/self-hosted | x_refsource_MISC |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-45606", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-18T13:20:21.809204Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-18T13:20:30.270Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "sentry", "vendor": "getsentry", "versions": [ { "status": "affected", "version": "\u003e=23.4.0, \u003c 24.9.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Sentry is a developer-first error tracking and performance monitoring platform. An authenticated user can mute alert rules from arbitrary organizations and projects with a know rule ID. The user does not need to be a member of the organization or have permissions on the project. In our review, we have identified no instances where alerts have been muted by unauthorized parties. A patch was issued to ensure authorization checks are properly scoped on requests to mute alert rules. Authenticated users who do not have the necessary permissions are no longer able to mute alerts. Sentry SaaS users do not need to take any action. Self-Hosted Sentry users should upgrade to version **24.9.0** or higher. The rule mute feature was generally available as of 23.6.0 but users with early access may have had the feature as of 23.4.0. Affected users are advised to upgrade to version 24.9.0. There are no known workarounds for this vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-639", "description": "CWE-639: Authorization Bypass Through User-Controlled Key", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-17T19:43:18.650Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/getsentry/sentry/security/advisories/GHSA-v345-w9f2-mpm5", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/getsentry/sentry/security/advisories/GHSA-v345-w9f2-mpm5" }, { "name": "https://github.com/getsentry/sentry/pull/77016", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/getsentry/sentry/pull/77016" }, { "name": "https://github.com/getsentry/self-hosted", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/getsentry/self-hosted" } ], "source": { "advisory": "GHSA-v345-w9f2-mpm5", "discovery": "UNKNOWN" }, "title": "Improper authorization on muting of alert rules in sentry" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-45606", "datePublished": "2024-09-17T19:43:18.650Z", "dateReserved": "2024-09-02T16:00:02.424Z", "dateUpdated": "2024-09-18T13:20:30.270Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-32474 (GCVE-0-2024-32474)
Vulnerability from cvelistv5
Published
2024-04-18 19:50
Modified
2024-08-02 02:13
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
Sentry is an error tracking and performance monitoring platform. Prior to 24.4.1, when authenticating as a superuser to Sentry with a username and password, the password is leaked as cleartext in logs under the _event_: `auth-index.validate_superuser`. An attacker with access to the log data could use these leaked credentials to login to the Sentry system as superuser. Self-hosted users on affected versions should upgrade to 24.4.1 or later. Users can configure the logging level to exclude logs of the `INFO` level and only generate logs for levels at `WARNING` or more.
References
▼ | URL | Tags |
---|---|---|
https://github.com/getsentry/sentry/security/advisories/GHSA-6cjm-4pxw-7xp9 | x_refsource_CONFIRM | |
https://github.com/getsentry/sentry/pull/66393 | x_refsource_MISC | |
https://github.com/getsentry/sentry/pull/69148 | x_refsource_MISC | |
https://github.com/getsentry/sentry/commit/d5b34568d9f1c41362ccb62141532a0a2169512f | x_refsource_MISC |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:getsentry:sentry:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "sentry", "vendor": "getsentry", "versions": [ { "lessThanOrEqual": "24.4.1", "status": "affected", "version": "24.3.0", "versionType": "semver" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-32474", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-04-23T14:22:52.411069Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:51:26.370Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T02:13:39.118Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/getsentry/sentry/security/advisories/GHSA-6cjm-4pxw-7xp9", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/getsentry/sentry/security/advisories/GHSA-6cjm-4pxw-7xp9" }, { "name": "https://github.com/getsentry/sentry/pull/66393", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/getsentry/sentry/pull/66393" }, { "name": "https://github.com/getsentry/sentry/pull/69148", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/getsentry/sentry/pull/69148" }, { "name": "https://github.com/getsentry/sentry/commit/d5b34568d9f1c41362ccb62141532a0a2169512f", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/getsentry/sentry/commit/d5b34568d9f1c41362ccb62141532a0a2169512f" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "sentry", "vendor": "getsentry", "versions": [ { "status": "affected", "version": "\u003e= 24.3.0, \u003c 24.4.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Sentry is an error tracking and performance monitoring platform. Prior to 24.4.1, when authenticating as a superuser to Sentry with a username and password, the password is leaked as cleartext in logs under the _event_: `auth-index.validate_superuser`. An attacker with access to the log data could use these leaked credentials to login to the Sentry system as superuser. Self-hosted users on affected versions should upgrade to 24.4.1 or later. Users can configure the logging level to exclude logs of the `INFO` level and only generate logs for levels at `WARNING` or more." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-312", "description": "CWE-312: Cleartext Storage of Sensitive Information", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-117", "description": "CWE-117: Improper Output Neutralization for Logs", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-18T19:50:44.541Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/getsentry/sentry/security/advisories/GHSA-6cjm-4pxw-7xp9", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/getsentry/sentry/security/advisories/GHSA-6cjm-4pxw-7xp9" }, { "name": "https://github.com/getsentry/sentry/pull/66393", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/getsentry/sentry/pull/66393" }, { "name": "https://github.com/getsentry/sentry/pull/69148", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/getsentry/sentry/pull/69148" }, { "name": "https://github.com/getsentry/sentry/commit/d5b34568d9f1c41362ccb62141532a0a2169512f", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/getsentry/sentry/commit/d5b34568d9f1c41362ccb62141532a0a2169512f" } ], "source": { "advisory": "GHSA-6cjm-4pxw-7xp9", "discovery": "UNKNOWN" }, "title": "Sentry\u0027s superuser cleartext password leaked in logs" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-32474", "datePublished": "2024-04-18T19:50:44.541Z", "dateReserved": "2024-04-12T19:41:51.167Z", "dateUpdated": "2024-08-02T02:13:39.118Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-53099 (GCVE-0-2025-53099)
Vulnerability from cvelistv5
Published
2025-07-01 14:53
Modified
2025-07-01 15:06
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-288 - Authentication Bypass Using an Alternate Path or Channel
Summary
Sentry is a developer-first error tracking and performance monitoring tool. Prior to version 25.5.0, an attacker with a malicious OAuth application registered with Sentry can take advantage of a race condition and improper handling of authorization code within Sentry to maintain persistence to a user's account. With a specially timed requests and redirect flows, an attacker could generate multiple authorization codes that could be used to exchange for access and refresh tokens. This was possible even after de-authorizing the particular application. This issue has been patched in version 25.5.0. Self-hosted Sentry users should upgrade to version 25.5.0 or higher. Sentry SaaS users do not need to take any action.
References
▼ | URL | Tags |
---|---|---|
https://github.com/getsentry/sentry/security/advisories/GHSA-mgh8-h4xc-pfmj | x_refsource_CONFIRM | |
https://github.com/getsentry/sentry/pull/85570 | x_refsource_MISC | |
https://github.com/getsentry/sentry/pull/85571 | x_refsource_MISC | |
https://github.com/getsentry/sentry/pull/86069 | x_refsource_MISC | |
https://github.com/getsentry/sentry/pull/86532 | x_refsource_MISC | |
https://github.com/getsentry/sentry/commit/57f0129e1e977b76fe8d16667a586578791a3dcd | x_refsource_MISC | |
https://github.com/getsentry/sentry/commit/ab5fd932ca6bd46529ba3308b4669e3cee719b8f | x_refsource_MISC | |
https://github.com/getsentry/sentry/commit/e6241254aead969e6c8490a81cde9a01335df19d | x_refsource_MISC |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-53099", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-07-01T15:06:16.063257Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-07-01T15:06:29.774Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "sentry", "vendor": "getsentry", "versions": [ { "status": "affected", "version": "\u003c 25.5.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Sentry is a developer-first error tracking and performance monitoring tool. Prior to version 25.5.0, an attacker with a malicious OAuth application registered with Sentry can take advantage of a race condition and improper handling of authorization code within Sentry to maintain persistence to a user\u0027s account. With a specially timed requests and redirect flows, an attacker could generate multiple authorization codes that could be used to exchange for access and refresh tokens. This was possible even after de-authorizing the particular application. This issue has been patched in version 25.5.0. Self-hosted Sentry users should upgrade to version 25.5.0 or higher. Sentry SaaS users do not need to take any action." } ], "metrics": [ { "cvssV4_0": { "attackComplexity": "LOW", "attackRequirements": "PRESENT", "attackVector": "NETWORK", "baseScore": 5.5, "baseSeverity": "MEDIUM", "privilegesRequired": "LOW", "subAvailabilityImpact": "HIGH", "subConfidentialityImpact": "HIGH", "subIntegrityImpact": "HIGH", "userInteraction": "PASSIVE", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:P/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H", "version": "4.0", "vulnAvailabilityImpact": "NONE", "vulnConfidentialityImpact": "NONE", "vulnIntegrityImpact": "NONE" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-288", "description": "CWE-288: Authentication Bypass Using an Alternate Path or Channel", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-07-01T14:53:16.878Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/getsentry/sentry/security/advisories/GHSA-mgh8-h4xc-pfmj", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/getsentry/sentry/security/advisories/GHSA-mgh8-h4xc-pfmj" }, { "name": "https://github.com/getsentry/sentry/pull/85570", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/getsentry/sentry/pull/85570" }, { "name": "https://github.com/getsentry/sentry/pull/85571", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/getsentry/sentry/pull/85571" }, { "name": "https://github.com/getsentry/sentry/pull/86069", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/getsentry/sentry/pull/86069" }, { "name": "https://github.com/getsentry/sentry/pull/86532", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/getsentry/sentry/pull/86532" }, { "name": "https://github.com/getsentry/sentry/commit/57f0129e1e977b76fe8d16667a586578791a3dcd", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/getsentry/sentry/commit/57f0129e1e977b76fe8d16667a586578791a3dcd" }, { "name": "https://github.com/getsentry/sentry/commit/ab5fd932ca6bd46529ba3308b4669e3cee719b8f", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/getsentry/sentry/commit/ab5fd932ca6bd46529ba3308b4669e3cee719b8f" }, { "name": "https://github.com/getsentry/sentry/commit/e6241254aead969e6c8490a81cde9a01335df19d", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/getsentry/sentry/commit/e6241254aead969e6c8490a81cde9a01335df19d" } ], "source": { "advisory": "GHSA-mgh8-h4xc-pfmj", "discovery": "UNKNOWN" }, "title": "Sentry Missing Invalidation of Authorization Codes During OAuth Exchange and Revocation" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2025-53099", "datePublished": "2025-07-01T14:53:16.878Z", "dateReserved": "2025-06-25T13:41:23.086Z", "dateUpdated": "2025-07-01T15:06:29.774Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-23485 (GCVE-0-2022-23485)
Vulnerability from cvelistv5
Published
2022-12-10 00:40
Modified
2025-04-23 16:29
Severity ?
VLAI Severity ?
EPSS score ?
Summary
Sentry is an error tracking and performance monitoring platform. In versions of the sentry python library prior to 22.11.0 an attacker with a known valid invite link could manipulate a cookie to allow the same invite link to be reused on multiple accounts when joining an organization. As a result an attacker with a valid invite link can create multiple users and join an organization they may not have been originally invited to. This issue was patched in version 22.11.0. Sentry SaaS customers do not need to take action. Self-hosted Sentry installs on systems which can not upgrade can disable the invite functionality until they are ready to deploy the patched version by editing their `sentry.conf.py` file (usually located at `~/.sentry/`).
References
▼ | URL | Tags |
---|---|---|
https://github.com/getsentry/sentry/security/advisories/GHSA-jv85-mqxj-3f9j | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T03:43:46.116Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/getsentry/sentry/security/advisories/GHSA-jv85-mqxj-3f9j", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/getsentry/sentry/security/advisories/GHSA-jv85-mqxj-3f9j" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-23485", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-23T13:52:42.448102Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-23T16:29:00.368Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "sentry", "vendor": "getsentry", "versions": [ { "status": "affected", "version": "\u003e= 20.6.0, \u003c 22.11.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Sentry is an error tracking and performance monitoring platform. In versions of the sentry python library prior to 22.11.0 an attacker with a known valid invite link could manipulate a cookie to allow the same invite link to be reused on multiple accounts when joining an organization. As a result an attacker with a valid invite link can create multiple users and join an organization they may not have been originally invited to. This issue was patched in version 22.11.0. Sentry SaaS customers do not need to take action. Self-hosted Sentry installs on systems which can not upgrade can disable the invite functionality until they are ready to deploy the patched version by editing their `sentry.conf.py` file (usually located at `~/.sentry/`).\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269: Improper Privilege Management", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284: Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-10T00:40:46.301Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/getsentry/sentry/security/advisories/GHSA-jv85-mqxj-3f9j", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/getsentry/sentry/security/advisories/GHSA-jv85-mqxj-3f9j" } ], "source": { "advisory": "GHSA-jv85-mqxj-3f9j", "discovery": "UNKNOWN" }, "title": "Invite code reuse via cookie manipulation in sentry" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-23485", "datePublished": "2022-12-10T00:40:46.301Z", "dateReserved": "2022-01-19T21:23:53.761Z", "dateUpdated": "2025-04-23T16:29:00.368Z", "requesterUserId": "c184a3d9-dc98-4c48-a45b-d2d88cf0ac74", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-41656 (GCVE-0-2024-41656)
Vulnerability from cvelistv5
Published
2024-07-23 21:30
Modified
2024-08-13 20:29
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Summary
Sentry is an error tracking and performance monitoring platform. Starting in version 10.0.0 and prior to version 24.7.1, an unsanitized payload sent by an Integration platform integration allows storing arbitrary HTML tags on the Sentry side with the subsequent rendering them on the Issues page. Self-hosted Sentry users may be impacted in case of untrustworthy Integration platform integrations sending external issues from their side to Sentry. A patch has been released in Sentry 24.7.1. For Sentry SaaS customers, no action is needed. This has been patched on July 23, and even prior to the fix, the exploitation was not possible due to the strict Content Security Policy deployed on sentry.io site. For self-hosted users, the maintainers of Sentry strongly recommend upgrading Sentry to the latest version. If it is not possible, one could enable CSP on one's self-hosted installation with `CSP_REPORT_ONLY = False` (enforcing mode). This will mitigate the risk of cross-site scripting.
References
▼ | URL | Tags |
---|---|---|
https://github.com/getsentry/sentry/security/advisories/GHSA-fm88-hc3v-3www | x_refsource_CONFIRM | |
https://github.com/getsentry/sentry/pull/74648 | x_refsource_MISC | |
https://github.com/getsentry/sentry/commit/5c679521f1539eabfb81287bfc30f34dbecd373e | x_refsource_MISC | |
https://github.com/getsentry/self-hosted/releases/tag/24.7.1 | x_refsource_MISC |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:getsentry:sentry:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "sentry", "vendor": "getsentry", "versions": [ { "lessThan": "24.7.1", "status": "affected", "version": "10.0.0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-41656", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-07-24T13:34:14.634010Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-13T20:29:11.466Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T04:46:52.659Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/getsentry/sentry/security/advisories/GHSA-fm88-hc3v-3www", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/getsentry/sentry/security/advisories/GHSA-fm88-hc3v-3www" }, { "name": "https://github.com/getsentry/sentry/pull/74648", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/getsentry/sentry/pull/74648" }, { "name": "https://github.com/getsentry/sentry/commit/5c679521f1539eabfb81287bfc30f34dbecd373e", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/getsentry/sentry/commit/5c679521f1539eabfb81287bfc30f34dbecd373e" }, { "name": "https://github.com/getsentry/self-hosted/releases/tag/24.7.1", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/getsentry/self-hosted/releases/tag/24.7.1" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "sentry", "vendor": "getsentry", "versions": [ { "status": "affected", "version": "\u003e= 10.0.0, \u003c 24.7.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Sentry is an error tracking and performance monitoring platform. Starting in version 10.0.0 and prior to version 24.7.1, an unsanitized payload sent by an Integration platform integration allows storing arbitrary HTML tags on the Sentry side with the subsequent rendering them on the Issues page. Self-hosted Sentry users may be impacted in case of untrustworthy Integration platform integrations sending external issues from their side to Sentry. A patch has been released in Sentry 24.7.1. For Sentry SaaS customers, no action is needed. This has been patched on July 23, and even prior to the fix, the exploitation was not possible due to the strict Content Security Policy deployed on sentry.io site. For self-hosted users, the maintainers of Sentry strongly recommend upgrading Sentry to the latest version. If it is not possible, one could enable CSP on one\u0027s self-hosted installation with `CSP_REPORT_ONLY = False` (enforcing mode). This will mitigate the risk of cross-site scripting." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-23T21:30:25.526Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/getsentry/sentry/security/advisories/GHSA-fm88-hc3v-3www", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/getsentry/sentry/security/advisories/GHSA-fm88-hc3v-3www" }, { "name": "https://github.com/getsentry/sentry/pull/74648", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/getsentry/sentry/pull/74648" }, { "name": "https://github.com/getsentry/sentry/commit/5c679521f1539eabfb81287bfc30f34dbecd373e", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/getsentry/sentry/commit/5c679521f1539eabfb81287bfc30f34dbecd373e" }, { "name": "https://github.com/getsentry/self-hosted/releases/tag/24.7.1", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/getsentry/self-hosted/releases/tag/24.7.1" } ], "source": { "advisory": "GHSA-fm88-hc3v-3www", "discovery": "UNKNOWN" }, "title": "Sentry vulnerable to stored Cross-Site Scripting (XSS)" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-41656", "datePublished": "2024-07-23T21:30:25.526Z", "dateReserved": "2024-07-18T15:21:47.481Z", "dateUpdated": "2024-08-13T20:29:11.466Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-24829 (GCVE-0-2024-24829)
Vulnerability from cvelistv5
Published
2024-02-08 23:44
Modified
2024-08-01 23:28
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-918 - Server-Side Request Forgery (SSRF)
Summary
Sentry is an error tracking and performance monitoring platform. Sentry’s integration platform provides a way for external services to interact with Sentry. One of such integrations, the Phabricator integration (maintained by Sentry) with version <=24.1.1 contains a constrained SSRF vulnerability. An attacker could make Sentry send POST HTTP requests to arbitrary URLs (including internal IP addresses) by providing an unsanitized input to the Phabricator integration. However, the body payload is constrained to a specific format. If an attacker has access to a Sentry instance, this allows them to: 1. interact with internal network; 2. scan local/remote ports. This issue has been fixed in Sentry self-hosted release 24.1.2, and has already been mitigated on sentry.io on February 8. Users are advised to upgrade. There are no known workarounds for this vulnerability.
References
▼ | URL | Tags |
---|---|---|
https://github.com/getsentry/sentry/security/advisories/GHSA-rqxh-fp9p-p98r | x_refsource_CONFIRM | |
https://github.com/getsentry/sentry/pull/64882 | x_refsource_MISC | |
https://github.com/getsentry/self-hosted/releases/tag/24.1.2 | x_refsource_MISC |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-24829", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-02-09T19:23:50.940961Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-05T17:20:49.165Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T23:28:12.936Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/getsentry/sentry/security/advisories/GHSA-rqxh-fp9p-p98r", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/getsentry/sentry/security/advisories/GHSA-rqxh-fp9p-p98r" }, { "name": "https://github.com/getsentry/sentry/pull/64882", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/getsentry/sentry/pull/64882" }, { "name": "https://github.com/getsentry/self-hosted/releases/tag/24.1.2", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/getsentry/self-hosted/releases/tag/24.1.2" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "sentry", "vendor": "getsentry", "versions": [ { "status": "affected", "version": "\u003e= 9.1.0, \u003c 24.1.2" } ] } ], "descriptions": [ { "lang": "en", "value": "Sentry is an error tracking and performance monitoring platform. Sentry\u2019s integration platform provides a way for external services to interact with Sentry. One of such integrations, the Phabricator integration (maintained by Sentry) with version \u003c=24.1.1 contains a constrained SSRF vulnerability. An attacker could make Sentry send POST HTTP requests to arbitrary URLs (including internal IP addresses) by providing an unsanitized input to the Phabricator integration. However, the body payload is constrained to a specific format. If an attacker has access to a Sentry instance, this allows them to: 1. interact with internal network; 2. scan local/remote ports. This issue has been fixed in Sentry self-hosted release 24.1.2, and has already been mitigated on sentry.io on February 8. Users are advised to upgrade. There are no known workarounds for this vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-918", "description": "CWE-918: Server-Side Request Forgery (SSRF)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-08T23:44:07.676Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/getsentry/sentry/security/advisories/GHSA-rqxh-fp9p-p98r", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/getsentry/sentry/security/advisories/GHSA-rqxh-fp9p-p98r" }, { "name": "https://github.com/getsentry/sentry/pull/64882", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/getsentry/sentry/pull/64882" }, { "name": "https://github.com/getsentry/self-hosted/releases/tag/24.1.2", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/getsentry/self-hosted/releases/tag/24.1.2" } ], "source": { "advisory": "GHSA-rqxh-fp9p-p98r", "discovery": "UNKNOWN" }, "title": "SSRF in Sentry via Phabricator integration" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-24829", "datePublished": "2024-02-08T23:44:07.676Z", "dateReserved": "2024-01-31T16:28:17.947Z", "dateUpdated": "2024-08-01T23:28:12.936Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-39531 (GCVE-0-2023-39531)
Vulnerability from cvelistv5
Published
2023-08-09 16:09
Modified
2024-10-03 15:12
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-287 - Improper Authentication
Summary
Sentry is an error tracking and performance monitoring platform. Starting in version 10.0.0 and prior to version 23.7.2, an attacker with sufficient client-side exploits could retrieve a valid access token for another user during the OAuth token exchange due to incorrect credential validation. The client ID must be known and the API application must have already been authorized on the targeted user account. Sentry SaaS customers do not need to take any action. Self-hosted installations should upgrade to version 23.7.2 or higher. There are no direct workarounds, but users should review applications authorized on their account and remove any that are no longer needed.
References
▼ | URL | Tags |
---|---|---|
https://github.com/getsentry/sentry/security/advisories/GHSA-hgj4-h2x3-rfx4 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:10:21.377Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/getsentry/sentry/security/advisories/GHSA-hgj4-h2x3-rfx4", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/getsentry/sentry/security/advisories/GHSA-hgj4-h2x3-rfx4" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-39531", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-03T15:12:07.030429Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-03T15:12:18.720Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "sentry", "vendor": "getsentry", "versions": [ { "status": "affected", "version": "\u003e= 10.0.0, \u003c 23.7.2" } ] } ], "descriptions": [ { "lang": "en", "value": "Sentry is an error tracking and performance monitoring platform. Starting in version 10.0.0 and prior to version 23.7.2, an attacker with sufficient client-side exploits could retrieve a valid access token for another user during the OAuth token exchange due to incorrect credential validation. The client ID must be known and the API application must have already been authorized on the targeted user account. Sentry SaaS customers do not need to take any action. Self-hosted installations should upgrade to version 23.7.2 or higher. There are no direct workarounds, but users should review applications authorized on their account and remove any that are no longer needed.\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-287", "description": "CWE-287: Improper Authentication", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-09T16:09:34.265Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/getsentry/sentry/security/advisories/GHSA-hgj4-h2x3-rfx4", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/getsentry/sentry/security/advisories/GHSA-hgj4-h2x3-rfx4" } ], "source": { "advisory": "GHSA-hgj4-h2x3-rfx4", "discovery": "UNKNOWN" }, "title": "Sentry vulnerable to incorrect credential validation on OAuth token requests" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-39531", "datePublished": "2023-08-09T16:09:34.265Z", "dateReserved": "2023-08-03T16:27:36.263Z", "dateUpdated": "2024-10-03T15:12:18.720Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2024-09-17 20:15
Modified
2024-09-26 19:16
Severity ?
7.1 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
Summary
Sentry is a developer-first error tracking and performance monitoring platform. An authenticated user can mute alert rules from arbitrary organizations and projects with a know rule ID. The user does not need to be a member of the organization or have permissions on the project. In our review, we have identified no instances where alerts have been muted by unauthorized parties. A patch was issued to ensure authorization checks are properly scoped on requests to mute alert rules. Authenticated users who do not have the necessary permissions are no longer able to mute alerts. Sentry SaaS users do not need to take any action. Self-Hosted Sentry users should upgrade to version **24.9.0** or higher. The rule mute feature was generally available as of 23.6.0 but users with early access may have had the feature as of 23.4.0. Affected users are advised to upgrade to version 24.9.0. There are no known workarounds for this vulnerability.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sentry:sentry:*:*:*:*:*:*:*:*", "matchCriteriaId": "799351F4-222E-42B9-97BB-C64AB2ACB5D0", "versionEndExcluding": "24.9.0", "versionStartIncluding": "23.4.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Sentry is a developer-first error tracking and performance monitoring platform. An authenticated user can mute alert rules from arbitrary organizations and projects with a know rule ID. The user does not need to be a member of the organization or have permissions on the project. In our review, we have identified no instances where alerts have been muted by unauthorized parties. A patch was issued to ensure authorization checks are properly scoped on requests to mute alert rules. Authenticated users who do not have the necessary permissions are no longer able to mute alerts. Sentry SaaS users do not need to take any action. Self-Hosted Sentry users should upgrade to version **24.9.0** or higher. The rule mute feature was generally available as of 23.6.0 but users with early access may have had the feature as of 23.4.0. Affected users are advised to upgrade to version 24.9.0. There are no known workarounds for this vulnerability." }, { "lang": "es", "value": "Sentry es una plataforma de seguimiento de errores y monitoreo de rendimiento que prioriza a los desarrolladores. Un usuario autenticado puede silenciar las reglas de alerta de organizaciones y proyectos arbitrarios con una ID de regla conocida. El usuario no necesita ser miembro de la organizaci\u00f3n ni tener permisos en el proyecto. En nuestra revisi\u00f3n, no hemos identificado instancias en las que las alertas hayan sido silenciadas por partes no autorizadas. Se emiti\u00f3 un parche para garantizar que las verificaciones de autorizaci\u00f3n tengan el alcance adecuado en las solicitudes para silenciar las reglas de alerta. Los usuarios autenticados que no tienen los permisos necesarios ya no pueden silenciar las alertas. Los usuarios de Sentry SaaS no necesitan realizar ninguna acci\u00f3n. Los usuarios alojados en Sentry deben actualizar a la versi\u00f3n **24.9.0** o superior. La funci\u00f3n de silenciamiento de reglas estaba disponible de manera general a partir de la versi\u00f3n 23.6.0, pero los usuarios con acceso anticipado pueden haber tenido la funci\u00f3n a partir de la versi\u00f3n 23.4.0. Se recomienda a los usuarios afectados que actualicen a la versi\u00f3n 24.9.0. No existen workarounds para esta vulnerabilidad." } ], "id": "CVE-2024-45606", "lastModified": "2024-09-26T19:16:40.720", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 4.2, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-09-17T20:15:05.393", "references": [ { "source": "security-advisories@github.com", "tags": [ "Not Applicable" ], "url": "https://github.com/getsentry/self-hosted" }, { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/getsentry/sentry/pull/77016" }, { "source": "security-advisories@github.com", "tags": [ "Vendor Advisory" ], "url": "https://github.com/getsentry/sentry/security/advisories/GHSA-v345-w9f2-mpm5" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-639" } ], "source": "security-advisories@github.com", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-07-25 19:15
Modified
2024-11-21 08:10
Severity ?
7.7 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Summary
Sentry is an error tracking and performance monitoring platform. Starting in version 8.21.0 and prior to version 23.5.2, an authenticated user can download a debug or artifact bundle from arbitrary organizations and projects with a known bundle ID. The user does not need to be a member of the organization or have permissions on the project. A patch was issued in version 23.5.2 to ensure authorization checks are properly scoped on requests to retrieve debug or artifact bundles. Authenticated users who do not have the necessary permissions on the particular project are no longer able to download them. Sentry SaaS users do not need to take any action. Self-Hosted Sentry users should upgrade to version 23.5.2 or higher.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sentry:sentry:*:*:*:*:*:*:*:*", "matchCriteriaId": "3BFE13DE-CDC1-443A-BA64-4F8B52C3C02E", "versionEndExcluding": "23.5.2", "versionStartIncluding": "8.21.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Sentry is an error tracking and performance monitoring platform. Starting in version 8.21.0 and prior to version 23.5.2, an authenticated user can download a debug or artifact bundle from arbitrary organizations and projects with a known bundle ID. The user does not need to be a member of the organization or have permissions on the project. A patch was issued in version 23.5.2 to ensure authorization checks are properly scoped on requests to retrieve debug or artifact bundles. Authenticated users who do not have the necessary permissions on the particular project are no longer able to download them. Sentry SaaS users do not need to take any action. Self-Hosted Sentry users should upgrade to version 23.5.2 or higher." } ], "id": "CVE-2023-36826", "lastModified": "2024-11-21T08:10:40.967", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.1, "impactScore": 4.0, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-07-25T19:15:11.640", "references": [ { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/getsentry/sentry/commit/e932b15435bf36239431eaa3790a6bcfa47046a9" }, { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/getsentry/sentry/pull/49680" }, { "source": "security-advisories@github.com", "tags": [ "Vendor Advisory" ], "url": "https://github.com/getsentry/sentry/security/advisories/GHSA-m4hc-m2v6-hfw8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/getsentry/sentry/commit/e932b15435bf36239431eaa3790a6bcfa47046a9" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/getsentry/sentry/pull/49680" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://github.com/getsentry/sentry/security/advisories/GHSA-m4hc-m2v6-hfw8" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-285" }, { "lang": "en", "value": "CWE-863" } ], "source": "security-advisories@github.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-863" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2025-07-01 15:15
Modified
2025-09-15 18:03
Severity ?
Summary
Sentry is a developer-first error tracking and performance monitoring tool. Prior to version 25.5.0, an attacker with a malicious OAuth application registered with Sentry can take advantage of a race condition and improper handling of authorization code within Sentry to maintain persistence to a user's account. With a specially timed requests and redirect flows, an attacker could generate multiple authorization codes that could be used to exchange for access and refresh tokens. This was possible even after de-authorizing the particular application. This issue has been patched in version 25.5.0. Self-hosted Sentry users should upgrade to version 25.5.0 or higher. Sentry SaaS users do not need to take any action.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sentry:sentry:*:*:*:*:*:*:*:*", "matchCriteriaId": "506960F4-199F-4766-9099-102DCA7ABBE5", "versionEndExcluding": "25.5.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Sentry is a developer-first error tracking and performance monitoring tool. Prior to version 25.5.0, an attacker with a malicious OAuth application registered with Sentry can take advantage of a race condition and improper handling of authorization code within Sentry to maintain persistence to a user\u0027s account. With a specially timed requests and redirect flows, an attacker could generate multiple authorization codes that could be used to exchange for access and refresh tokens. This was possible even after de-authorizing the particular application. This issue has been patched in version 25.5.0. Self-hosted Sentry users should upgrade to version 25.5.0 or higher. Sentry SaaS users do not need to take any action." }, { "lang": "es", "value": "Sentry es una herramienta de seguimiento de errores y monitorizaci\u00f3n del rendimiento centrada en el desarrollador. Antes de la versi\u00f3n 25.5.0, un atacante con una aplicaci\u00f3n OAuth maliciosa registrada en Sentry pod\u00eda aprovechar una condici\u00f3n de ejecuci\u00f3n y la gesti\u00f3n incorrecta del c\u00f3digo de autorizaci\u00f3n en Sentry para mantener la persistencia en la cuenta de un usuario. Con solicitudes y flujos de redirecci\u00f3n con tiempos espec\u00edficos, un atacante pod\u00eda generar m\u00faltiples c\u00f3digos de autorizaci\u00f3n que se pod\u00edan usar para intercambiar tokens de acceso y actualizaci\u00f3n. Esto era posible incluso despu\u00e9s de desautorizar la aplicaci\u00f3n en cuesti\u00f3n. Este problema se ha corregido en la versi\u00f3n 25.5.0. Los usuarios de Sentry autoalojado deben actualizar a la versi\u00f3n 25.5.0 o superior. Los usuarios de Sentry SaaS no necesitan realizar ninguna acci\u00f3n." } ], "id": "CVE-2025-53099", "lastModified": "2025-09-15T18:03:33.857", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "PRESENT", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "LOW", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "HIGH", "subConfidentialityImpact": "HIGH", "subIntegrityImpact": "HIGH", "userInteraction": "PASSIVE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:P/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "NONE", "vulnConfidentialityImpact": "NONE", "vulnIntegrityImpact": "NONE", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "security-advisories@github.com", "type": "Secondary" } ] }, "published": "2025-07-01T15:15:26.277", "references": [ { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/getsentry/sentry/commit/57f0129e1e977b76fe8d16667a586578791a3dcd" }, { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/getsentry/sentry/commit/ab5fd932ca6bd46529ba3308b4669e3cee719b8f" }, { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/getsentry/sentry/commit/e6241254aead969e6c8490a81cde9a01335df19d" }, { "source": "security-advisories@github.com", "tags": [ "Issue Tracking", "Patch" ], "url": "https://github.com/getsentry/sentry/pull/85570" }, { "source": "security-advisories@github.com", "tags": [ "Issue Tracking", "Patch" ], "url": "https://github.com/getsentry/sentry/pull/85571" }, { "source": "security-advisories@github.com", "tags": [ "Issue Tracking" ], "url": "https://github.com/getsentry/sentry/pull/86069" }, { "source": "security-advisories@github.com", "tags": [ "Issue Tracking" ], "url": "https://github.com/getsentry/sentry/pull/86532" }, { "source": "security-advisories@github.com", "tags": [ "Vendor Advisory" ], "url": "https://github.com/getsentry/sentry/security/advisories/GHSA-mgh8-h4xc-pfmj" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-288" } ], "source": "security-advisories@github.com", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-11-22 20:15
Modified
2025-09-15 18:03
Severity ?
Summary
Sentry is an error tracking and performance monitoring platform. Version 24.11.0, and only version 24.11.0, is vulnerable to a scenario where a specific error message generated by the Sentry platform could include a plaintext Client ID and Client Secret for an application integration. The Client ID and Client Secret would not be displayed in the UI, but would be returned in the underlying HTTP response to the end user. This could occur under the following conditions: An app installation made use of a Search UI component with the `async` flag set to true (default: true); auser types types into the Search Component which creates a request to the third-party for search or query results; and that third-party response may then fail validation and Sentry would return the `select-requester.invalid-response` error code along with a serialized version of a Sentry application containing the integration Client Secret. Should this error be found, it's reasonable to assume the potential exposure of an integration Client Secret. However, an ID and Secret pair alone does not provide direct access to any data. For that secret to be abused an attacker would also need to obtain a valid API token for a Sentry application.
Sentry SaaS users do not need to take any action. For Sentry SaaS users, only a single application integration was impacted and the owner has rotated their Client Secret. No abuse of the leaked Client Secret has occurred.
As of time of publication, a fix is available for users of Sentry self-hosted in pull request 81038. Sentry self-hosted does not ship with any application integrations. This could only impact self-hosted users that maintain their own integrations. In that case, search for a `select-requester.invalid-response` event. Please note that this error was also shared with another event unrelated to this advisory so Sentry self-hosted users will also need to review the parameters logged for each named event. Sentry self-hosted users may review `select_requester.py` for the instances where these errors can be generated. With the security fix this is no longer a shared event type. Sentry self-hosted users may not install version 24.11.0 and instead wait for the next release. Self-hosted instance that are already running the affected version may consider downgrading to to 24.10.0.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sentry:sentry:24.11.0:*:*:*:*:*:*:*", "matchCriteriaId": "BD9BC012-BE1B-467F-9D9F-BBC0446EE702", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Sentry is an error tracking and performance monitoring platform. Version 24.11.0, and only version 24.11.0, is vulnerable to a scenario where a specific error message generated by the Sentry platform could include a plaintext Client ID and Client Secret for an application integration. The Client ID and Client Secret would not be displayed in the UI, but would be returned in the underlying HTTP response to the end user. This could occur under the following conditions: An app installation made use of a Search UI component with the `async` flag set to true (default: true); auser types types into the Search Component which creates a request to the third-party for search or query results; and that third-party response may then fail validation and Sentry would return the `select-requester.invalid-response` error code along with a serialized version of a Sentry application containing the integration Client Secret. Should this error be found, it\u0027s reasonable to assume the potential exposure of an integration Client Secret. However, an ID and Secret pair alone does not provide direct access to any data. For that secret to be abused an attacker would also need to obtain a valid API token for a Sentry application. \n\nSentry SaaS users do not need to take any action. For Sentry SaaS users, only a single application integration was impacted and the owner has rotated their Client Secret. No abuse of the leaked Client Secret has occurred.\n\nAs of time of publication, a fix is available for users of Sentry self-hosted in pull request 81038. Sentry self-hosted does not ship with any application integrations. This could only impact self-hosted users that maintain their own integrations. In that case, search for a `select-requester.invalid-response` event. Please note that this error was also shared with another event unrelated to this advisory so Sentry self-hosted users will also need to review the parameters logged for each named event. Sentry self-hosted users may review `select_requester.py` for the instances where these errors can be generated. With the security fix this is no longer a shared event type. Sentry self-hosted users may not install version 24.11.0 and instead wait for the next release. Self-hosted instance that are already running the affected version may consider downgrading to to 24.10.0." }, { "lang": "es", "value": "Sentry es una plataforma de seguimiento de errores y monitoreo de rendimiento. La versi\u00f3n 24.11.0, y solo la versi\u00f3n 24.11.0, es vulnerable a un escenario en el que un mensaje de error espec\u00edfico generado por la plataforma Sentry podr\u00eda incluir un ID de cliente y un secreto de cliente en texto plano para una integraci\u00f3n de aplicaciones. El ID de cliente y el secreto de cliente no se mostrar\u00edan en la interfaz de usuario, pero se devolver\u00edan en la respuesta HTTP subyacente al usuario final. Esto podr\u00eda ocurrir en las siguientes condiciones: una instalaci\u00f3n de aplicaci\u00f3n hizo uso de un componente de interfaz de usuario de b\u00fasqueda con el indicador `async` establecido en verdadero (valor predeterminado: verdadero); un usuario escribe en el componente de b\u00fasqueda que crea una solicitud al tercero para obtener resultados de b\u00fasqueda o consulta; y esa respuesta de terceros puede fallar en la validaci\u00f3n y Sentry devolver\u00eda el c\u00f3digo de error `select-requester.invalid-response` junto con una versi\u00f3n serializada de una aplicaci\u00f3n Sentry que contiene el secreto de cliente de integraci\u00f3n. Si se encuentra este error, es razonable suponer la posible exposici\u00f3n de un secreto de cliente de integraci\u00f3n. Sin embargo, un par de ID y secreto por s\u00ed solo no proporciona acceso directo a ning\u00fan dato. Para que se abuse de ese secreto, un atacante tambi\u00e9n necesitar\u00eda obtener un token de API v\u00e1lido para una aplicaci\u00f3n Sentry. Los usuarios de Sentry SaaS no necesitan realizar ninguna acci\u00f3n. Para los usuarios de Sentry SaaS, solo se vio afectada una \u00fanica integraci\u00f3n de aplicaci\u00f3n y el propietario ha rotado su secreto de cliente. No se ha producido ning\u00fan abuso del secreto de cliente filtrado. Al momento de la publicaci\u00f3n, hay una soluci\u00f3n disponible para los usuarios de Sentry autoalojado en la solicitud de extracci\u00f3n 81038. Sentry autoalojado no se env\u00eda con ninguna integraci\u00f3n de aplicaciones. Esto solo podr\u00eda afectar a los usuarios autoalojados que mantienen sus propias integraciones. En ese caso, busque un evento `select-requester.invalid-response`. Tenga en cuenta que este error tambi\u00e9n se comparti\u00f3 con otro evento no relacionado con este aviso, por lo que los usuarios autoalojados de Sentry tambi\u00e9n deber\u00e1n revisar los par\u00e1metros registrados para cada evento nombrado. Los usuarios autoalojados de Sentry pueden revisar `select_requester.py` para las instancias en las que se pueden generar estos errores. Con la soluci\u00f3n de seguridad, este ya no es un tipo de evento compartido. Los usuarios alojados en Sentry no pueden instalar la versi\u00f3n 24.11.0 y, en su lugar, esperar a la pr\u00f3xima versi\u00f3n. Las instancias alojadas en Sentry que ya est\u00e9n ejecutando la versi\u00f3n afectada pueden considerar la posibilidad de actualizar a la versi\u00f3n 24.10.0." } ], "id": "CVE-2024-53253", "lastModified": "2025-09-15T18:03:56.837", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "security-advisories@github.com", "type": "Secondary" } ] }, "published": "2024-11-22T20:15:09.210", "references": [ { "source": "security-advisories@github.com", "tags": [ "Issue Tracking" ], "url": "https://github.com/getsentry/sentry/pull/79377" }, { "source": "security-advisories@github.com", "tags": [ "Issue Tracking" ], "url": "https://github.com/getsentry/sentry/pull/81038" }, { "source": "security-advisories@github.com", "tags": [ "Vendor Advisory" ], "url": "https://github.com/getsentry/sentry/security/advisories/GHSA-v5h2-q2w4-gpcx" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-209" } ], "source": "security-advisories@github.com", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2024-07-23 22:15
Modified
2025-09-15 18:04
Severity ?
7.1 (High) - CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Summary
Sentry is an error tracking and performance monitoring platform. Starting in version 10.0.0 and prior to version 24.7.1, an unsanitized payload sent by an Integration platform integration allows storing arbitrary HTML tags on the Sentry side with the subsequent rendering them on the Issues page. Self-hosted Sentry users may be impacted in case of untrustworthy Integration platform integrations sending external issues from their side to Sentry. A patch has been released in Sentry 24.7.1. For Sentry SaaS customers, no action is needed. This has been patched on July 23, and even prior to the fix, the exploitation was not possible due to the strict Content Security Policy deployed on sentry.io site. For self-hosted users, the maintainers of Sentry strongly recommend upgrading Sentry to the latest version. If it is not possible, one could enable CSP on one's self-hosted installation with `CSP_REPORT_ONLY = False` (enforcing mode). This will mitigate the risk of cross-site scripting.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sentry:sentry:*:*:*:*:*:*:*:*", "matchCriteriaId": "FADE2512-234A-4801-9204-B14517B77496", "versionEndExcluding": "24.7.1", "versionStartIncluding": "10.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Sentry is an error tracking and performance monitoring platform. Starting in version 10.0.0 and prior to version 24.7.1, an unsanitized payload sent by an Integration platform integration allows storing arbitrary HTML tags on the Sentry side with the subsequent rendering them on the Issues page. Self-hosted Sentry users may be impacted in case of untrustworthy Integration platform integrations sending external issues from their side to Sentry. A patch has been released in Sentry 24.7.1. For Sentry SaaS customers, no action is needed. This has been patched on July 23, and even prior to the fix, the exploitation was not possible due to the strict Content Security Policy deployed on sentry.io site. For self-hosted users, the maintainers of Sentry strongly recommend upgrading Sentry to the latest version. If it is not possible, one could enable CSP on one\u0027s self-hosted installation with `CSP_REPORT_ONLY = False` (enforcing mode). This will mitigate the risk of cross-site scripting." }, { "lang": "es", "value": "Sentry es una plataforma de seguimiento de errores y supervisi\u00f3n del rendimiento. A partir de la versi\u00f3n 10.0.0 y antes de la versi\u00f3n 24.7.1, un payload no saneado enviado por una integraci\u00f3n de plataforma de integraci\u00f3n permite almacenar etiquetas HTML arbitrarias en el lado de Sentry y luego representarlas en la p\u00e1gina de Issues. Los usuarios de Sentry autohospedados pueden verse afectados en caso de integraciones de plataformas de integraci\u00f3n no confiables que env\u00eden problemas externos de su lado a Sentry. Se lanz\u00f3 un parche en Sentry 24.7.1. Para los clientes de Sentry SaaS, no es necesario realizar ninguna acci\u00f3n. Esto fue parcheado el 23 de julio e incluso antes de la soluci\u00f3n, la explotaci\u00f3n no era posible debido a la estricta Pol\u00edtica de seguridad de contenido implementada en el sitio sentry.io. Para los usuarios autohospedados, los mantenedores de Sentry recomiendan encarecidamente actualizar Sentry a la \u00faltima versi\u00f3n. Si no es posible, se podr\u00eda habilitar CSP en la instalaci\u00f3n autohospedada con `CSP_REPORT_ONLY = False` (enforcing mode). Esto mitigar\u00e1 el riesgo de Cross Site Scripting." } ], "id": "CVE-2024-41656", "lastModified": "2025-09-15T18:04:19.370", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-07-23T22:15:08.970", "references": [ { "source": "security-advisories@github.com", "tags": [ "Release Notes" ], "url": "https://github.com/getsentry/self-hosted/releases/tag/24.7.1" }, { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/getsentry/sentry/commit/5c679521f1539eabfb81287bfc30f34dbecd373e" }, { "source": "security-advisories@github.com", "tags": [ "Issue Tracking", "Patch" ], "url": "https://github.com/getsentry/sentry/pull/74648" }, { "source": "security-advisories@github.com", "tags": [ "Vendor Advisory" ], "url": "https://github.com/getsentry/sentry/security/advisories/GHSA-fm88-hc3v-3www" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes" ], "url": "https://github.com/getsentry/self-hosted/releases/tag/24.7.1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/getsentry/sentry/commit/5c679521f1539eabfb81287bfc30f34dbecd373e" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch" ], "url": "https://github.com/getsentry/sentry/pull/74648" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://github.com/getsentry/sentry/security/advisories/GHSA-fm88-hc3v-3www" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "security-advisories@github.com", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2023-08-09 17:15
Modified
2024-11-21 08:15
Severity ?
6.5 (Medium) - CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:L/A:N
6.8 (Medium) - CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N
6.8 (Medium) - CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N
Summary
Sentry is an error tracking and performance monitoring platform. Starting in version 10.0.0 and prior to version 23.7.2, an attacker with sufficient client-side exploits could retrieve a valid access token for another user during the OAuth token exchange due to incorrect credential validation. The client ID must be known and the API application must have already been authorized on the targeted user account. Sentry SaaS customers do not need to take any action. Self-hosted installations should upgrade to version 23.7.2 or higher. There are no direct workarounds, but users should review applications authorized on their account and remove any that are no longer needed.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sentry:sentry:*:*:*:*:*:*:*:*", "matchCriteriaId": "F9FF2EA1-64DB-404A-A036-C2E4983773CB", "versionEndExcluding": "23.7.2", "versionStartIncluding": "10.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Sentry is an error tracking and performance monitoring platform. Starting in version 10.0.0 and prior to version 23.7.2, an attacker with sufficient client-side exploits could retrieve a valid access token for another user during the OAuth token exchange due to incorrect credential validation. The client ID must be known and the API application must have already been authorized on the targeted user account. Sentry SaaS customers do not need to take any action. Self-hosted installations should upgrade to version 23.7.2 or higher. There are no direct workarounds, but users should review applications authorized on their account and remove any that are no longer needed.\n\n" }, { "lang": "es", "value": "Sentry es una plataforma de seguimiento de errores y monitorizaci\u00f3n del rendimiento. A partir de la versi\u00f3n 10.0.0 y antes de la versi\u00f3n 23.7.2, un atacante con suficientes exploits del lado del cliente podr\u00eda recuperar un token de acceso v\u00e1lido para otro usuario durante el intercambio de tokens OAuth debido a una validaci\u00f3n de credenciales incorrecta. El ID del cliente debe ser conocido y la aplicaci\u00f3n API debe haber sido ya autorizada en la cuenta del usuario objetivo. Los clientes de Sentry SaaS no necesitan realizar ninguna acci\u00f3n. Las instalaciones autoalojadas deben actualizarse a la versi\u00f3n 23.7.2 o superior. No hay soluciones directas, pero los usuarios deben revisar las aplicaciones autorizadas en su cuenta y eliminar las que ya no sean necesarias." } ], "id": "CVE-2023-39531", "lastModified": "2024-11-21T08:15:36.970", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.3, "impactScore": 4.7, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-08-09T17:15:09.827", "references": [ { "source": "security-advisories@github.com", "tags": [ "Vendor Advisory" ], "url": "https://github.com/getsentry/sentry/security/advisories/GHSA-hgj4-h2x3-rfx4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://github.com/getsentry/sentry/security/advisories/GHSA-hgj4-h2x3-rfx4" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "security-advisories@github.com", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-12-10 01:15
Modified
2024-11-21 06:48
Severity ?
6.4 (Medium) - CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:L
3.7 (Low) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
3.7 (Low) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
Summary
Sentry is an error tracking and performance monitoring platform. In versions of the sentry python library prior to 22.11.0 an attacker with a known valid invite link could manipulate a cookie to allow the same invite link to be reused on multiple accounts when joining an organization. As a result an attacker with a valid invite link can create multiple users and join an organization they may not have been originally invited to. This issue was patched in version 22.11.0. Sentry SaaS customers do not need to take action. Self-hosted Sentry installs on systems which can not upgrade can disable the invite functionality until they are ready to deploy the patched version by editing their `sentry.conf.py` file (usually located at `~/.sentry/`).
References
▼ | URL | Tags | |
---|---|---|---|
security-advisories@github.com | https://github.com/getsentry/sentry/security/advisories/GHSA-jv85-mqxj-3f9j | Mitigation, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/getsentry/sentry/security/advisories/GHSA-jv85-mqxj-3f9j | Mitigation, Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sentry:sentry:*:*:*:*:*:*:*:*", "matchCriteriaId": "814C8FDF-2E32-4C19-87DC-0912FC481433", "versionEndIncluding": "22.10.0", "versionStartIncluding": "20.6.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Sentry is an error tracking and performance monitoring platform. In versions of the sentry python library prior to 22.11.0 an attacker with a known valid invite link could manipulate a cookie to allow the same invite link to be reused on multiple accounts when joining an organization. As a result an attacker with a valid invite link can create multiple users and join an organization they may not have been originally invited to. This issue was patched in version 22.11.0. Sentry SaaS customers do not need to take action. Self-hosted Sentry installs on systems which can not upgrade can disable the invite functionality until they are ready to deploy the patched version by editing their `sentry.conf.py` file (usually located at `~/.sentry/`).\n" }, { "lang": "es", "value": "Sentry es una plataforma de seguimiento de errores y supervisi\u00f3n del rendimiento. En versiones de la librer\u00eda Sentry Python anteriores a la 22.11.0, un atacante con un enlace de invitaci\u00f3n v\u00e1lido conocido podr\u00eda manipular una cookie para permitir que el mismo enlace de invitaci\u00f3n se reutilice en varias cuentas al unirse a una organizaci\u00f3n. Como resultado, un atacante con un enlace de invitaci\u00f3n v\u00e1lido puede crear varios usuarios y unirse a una organizaci\u00f3n a la que tal vez no hayan sido invitados originalmente. Este problema se solucion\u00f3 en la versi\u00f3n 22.11.0. Los clientes de Sentry SaaS no necesitan realizar ninguna acci\u00f3n. Las instalaciones autohospedadas de Sentry en sistemas que no pueden actualizarse pueden desactivar la funcionalidad de invitaci\u00f3n hasta que est\u00e9n listos para implementar la versi\u00f3n parcheada editando su archivo `sentry.conf.py` (generalmente ubicado en `~/.sentry/`)." } ], "id": "CVE-2022-23485", "lastModified": "2024-11-21T06:48:39.560", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 4.7, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-12-10T01:15:10.273", "references": [ { "source": "security-advisories@github.com", "tags": [ "Mitigation", "Third Party Advisory" ], "url": "https://github.com/getsentry/sentry/security/advisories/GHSA-jv85-mqxj-3f9j" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Third Party Advisory" ], "url": "https://github.com/getsentry/sentry/security/advisories/GHSA-jv85-mqxj-3f9j" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-269" }, { "lang": "en", "value": "CWE-284" } ], "source": "security-advisories@github.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-269" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-02-09 00:15
Modified
2024-11-21 08:59
Severity ?
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Summary
Sentry is an error tracking and performance monitoring platform. Sentry’s integration platform provides a way for external services to interact with Sentry. One of such integrations, the Phabricator integration (maintained by Sentry) with version <=24.1.1 contains a constrained SSRF vulnerability. An attacker could make Sentry send POST HTTP requests to arbitrary URLs (including internal IP addresses) by providing an unsanitized input to the Phabricator integration. However, the body payload is constrained to a specific format. If an attacker has access to a Sentry instance, this allows them to: 1. interact with internal network; 2. scan local/remote ports. This issue has been fixed in Sentry self-hosted release 24.1.2, and has already been mitigated on sentry.io on February 8. Users are advised to upgrade. There are no known workarounds for this vulnerability.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sentry:sentry:*:*:*:*:*:*:*:*", "matchCriteriaId": "71E40428-D743-4670-B61B-296C02D610E3", "versionEndExcluding": "24.1.2", "versionStartIncluding": "9.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Sentry is an error tracking and performance monitoring platform. Sentry\u2019s integration platform provides a way for external services to interact with Sentry. One of such integrations, the Phabricator integration (maintained by Sentry) with version \u003c=24.1.1 contains a constrained SSRF vulnerability. An attacker could make Sentry send POST HTTP requests to arbitrary URLs (including internal IP addresses) by providing an unsanitized input to the Phabricator integration. However, the body payload is constrained to a specific format. If an attacker has access to a Sentry instance, this allows them to: 1. interact with internal network; 2. scan local/remote ports. This issue has been fixed in Sentry self-hosted release 24.1.2, and has already been mitigated on sentry.io on February 8. Users are advised to upgrade. There are no known workarounds for this vulnerability." }, { "lang": "es", "value": "Sentry es una plataforma de seguimiento de errores y supervisi\u00f3n del rendimiento. La plataforma de integraci\u00f3n de Sentry proporciona una forma para que los servicios externos interact\u00faen con Sentry. Una de esas integraciones, la integraci\u00f3n de Phabricator (mantenida por Sentry) con la versi\u00f3n \u0026lt;=24.1.1, contiene una vulnerabilidad SSRF restringida. Un atacante podr\u00eda hacer que Sentry env\u00ede solicitudes POST HTTP a URL arbitrarias (incluidas direcciones IP internas) proporcionando una entrada no sanitizada a la integraci\u00f3n de Phabricator. Sin embargo, el payload de la carrocer\u00eda est\u00e1 limitado a un formato espec\u00edfico. Si un atacante tiene acceso a una instancia de Sentry, esto le permite: 1. interactuar con la red interna; 2. escanear puertos locales/remotos. Este problema se solucion\u00f3 en la versi\u00f3n 24.1.2 autohospedada de Sentry y ya se mitig\u00f3 en sentry.io el 8 de febrero. Se recomienda a los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad." } ], "id": "CVE-2024-24829", "lastModified": "2024-11-21T08:59:48.350", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-02-09T00:15:09.117", "references": [ { "source": "security-advisories@github.com", "tags": [ "Release Notes" ], "url": "https://github.com/getsentry/self-hosted/releases/tag/24.1.2" }, { "source": "security-advisories@github.com", "tags": [ "Issue Tracking" ], "url": "https://github.com/getsentry/sentry/pull/64882" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/getsentry/sentry/security/advisories/GHSA-rqxh-fp9p-p98r" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes" ], "url": "https://github.com/getsentry/self-hosted/releases/tag/24.1.2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking" ], "url": "https://github.com/getsentry/sentry/pull/64882" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/getsentry/sentry/security/advisories/GHSA-rqxh-fp9p-p98r" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-918" } ], "source": "security-advisories@github.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-918" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-04-18 20:15
Modified
2025-09-15 16:53
Severity ?
7.3 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Summary
Sentry is an error tracking and performance monitoring platform. Prior to 24.4.1, when authenticating as a superuser to Sentry with a username and password, the password is leaked as cleartext in logs under the _event_: `auth-index.validate_superuser`. An attacker with access to the log data could use these leaked credentials to login to the Sentry system as superuser. Self-hosted users on affected versions should upgrade to 24.4.1 or later. Users can configure the logging level to exclude logs of the `INFO` level and only generate logs for levels at `WARNING` or more.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sentry:sentry:*:*:*:*:*:*:*:*", "matchCriteriaId": "4EAC36D5-6A43-4C98-BC60-79C75B644F5C", "versionEndExcluding": "24.4.1", "versionStartIncluding": "24.3.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Sentry is an error tracking and performance monitoring platform. Prior to 24.4.1, when authenticating as a superuser to Sentry with a username and password, the password is leaked as cleartext in logs under the _event_: `auth-index.validate_superuser`. An attacker with access to the log data could use these leaked credentials to login to the Sentry system as superuser. Self-hosted users on affected versions should upgrade to 24.4.1 or later. Users can configure the logging level to exclude logs of the `INFO` level and only generate logs for levels at `WARNING` or more." }, { "lang": "es", "value": "Sentry es una plataforma de seguimiento de errores y supervisi\u00f3n del rendimiento. Antes de 24.4.1, al autenticarse como superusuario en Sentry con un nombre de usuario y contrase\u00f1a, la contrase\u00f1a se filtraba como texto plano en los registros bajo el _event_: `auth-index.validate_superuser`. Un atacante con acceso a los datos de registro podr\u00eda utilizar estas credenciales filtradas para iniciar sesi\u00f3n en el sistema Sentry como superusuario. Los usuarios autohospedados de las versiones afectadas deben actualizar a 24.4.1 o posterior. Los usuarios pueden configurar el nivel de registro para excluir registros del nivel \"INFO\" y solo generar registros para niveles en \"ADVERTENCIA\" o m\u00e1s." } ], "id": "CVE-2024-32474", "lastModified": "2025-09-15T16:53:23.963", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.1, "impactScore": 5.2, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-04-18T20:15:17.733", "references": [ { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/getsentry/sentry/commit/d5b34568d9f1c41362ccb62141532a0a2169512f" }, { "source": "security-advisories@github.com", "tags": [ "Issue Tracking" ], "url": "https://github.com/getsentry/sentry/pull/66393" }, { "source": "security-advisories@github.com", "tags": [ "Issue Tracking" ], "url": "https://github.com/getsentry/sentry/pull/69148" }, { "source": "security-advisories@github.com", "tags": [ "Vendor Advisory", "Mitigation" ], "url": "https://github.com/getsentry/sentry/security/advisories/GHSA-6cjm-4pxw-7xp9" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/getsentry/sentry/commit/d5b34568d9f1c41362ccb62141532a0a2169512f" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking" ], "url": "https://github.com/getsentry/sentry/pull/66393" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking" ], "url": "https://github.com/getsentry/sentry/pull/69148" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory", "Mitigation" ], "url": "https://github.com/getsentry/sentry/security/advisories/GHSA-6cjm-4pxw-7xp9" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-117" }, { "lang": "en", "value": "CWE-312" } ], "source": "security-advisories@github.com", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2023-08-07 19:15
Modified
2024-11-21 08:15
Severity ?
8.1 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
8.1 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
8.1 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
Summary
Sentry is an error tracking and performance monitoring platform. Starting in version 22.1.0 and prior to version 23.7.2, an attacker with access to a token with few or no scopes can query `/api/0/api-tokens/` for a list of all tokens created by a user, including tokens with greater scopes, and use those tokens in other requests. There is no evidence that the issue was exploited on `sentry.io`. For self-hosted users, it is advised to rotate user auth tokens. A fix is available in version 23.7.2 of `sentry` and `self-hosted`. There are no known workarounds.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sentry:sentry:*:*:*:*:*:*:*:*", "matchCriteriaId": "C9764018-F8B3-4978-83C0-D5362EED433D", "versionEndExcluding": "23.7.2", "versionStartIncluding": "22.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Sentry is an error tracking and performance monitoring platform. Starting in version 22.1.0 and prior to version 23.7.2, an attacker with access to a token with few or no scopes can query `/api/0/api-tokens/` for a list of all tokens created by a user, including tokens with greater scopes, and use those tokens in other requests. There is no evidence that the issue was exploited on `sentry.io`. For self-hosted users, it is advised to rotate user auth tokens. A fix is available in version 23.7.2 of `sentry` and `self-hosted`. There are no known workarounds." } ], "id": "CVE-2023-39349", "lastModified": "2024-11-21T08:15:12.627", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.2, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-08-07T19:15:11.697", "references": [ { "source": "security-advisories@github.com", "tags": [ "Release Notes" ], "url": "https://github.com/getsentry/self-hosted/releases/tag/23.7.2" }, { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/getsentry/sentry/commit/fad12c1150d1135edf9666ea72ca11bc110c1083" }, { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/getsentry/sentry/pull/53850" }, { "source": "security-advisories@github.com", "tags": [ "Release Notes" ], "url": "https://github.com/getsentry/sentry/releases/tag/23.7.2" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/getsentry/sentry/security/advisories/GHSA-9jcq-jf57-c62c" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes" ], "url": "https://github.com/getsentry/self-hosted/releases/tag/23.7.2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/getsentry/sentry/commit/fad12c1150d1135edf9666ea72ca11bc110c1083" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/getsentry/sentry/pull/53850" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes" ], "url": "https://github.com/getsentry/sentry/releases/tag/23.7.2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/getsentry/sentry/security/advisories/GHSA-9jcq-jf57-c62c" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-284" }, { "lang": "en", "value": "CWE-287" } ], "source": "security-advisories@github.com", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-09-17 20:15
Modified
2024-09-26 19:14
Severity ?
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
Summary
Sentry is a developer-first error tracking and performance monitoring platform. An authenticated user delete the user issue alert notifications for arbitrary users given a know alert ID. A patch was issued to ensure authorization checks are properly scoped on requests to delete user alert notifications. Sentry SaaS users do not need to take any action. Self-Hosted Sentry users should upgrade to version 24.9.0 or higher. There are no known workarounds for this vulnerability.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sentry:sentry:*:*:*:*:*:*:*:*", "matchCriteriaId": "2E6FD59C-D86A-4163-9245-EC4000DC98FC", "versionEndExcluding": "24.9.0", "versionStartIncluding": "23.9.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Sentry is a developer-first error tracking and performance monitoring platform. An authenticated user delete the user issue alert notifications for arbitrary users given a know alert ID. A patch was issued to ensure authorization checks are properly scoped on requests to delete user alert notifications. Sentry SaaS users do not need to take any action. Self-Hosted Sentry users should upgrade to version 24.9.0 or higher. There are no known workarounds for this vulnerability." }, { "lang": "es", "value": "Sentry es una plataforma de monitoreo de rendimiento y seguimiento de errores que prioriza a los desarrolladores. Un usuario autenticado elimina las notificaciones de alerta de emisi\u00f3n de usuario para usuarios arbitrarios a partir de una ID de alerta conocida. Se emiti\u00f3 un parche para garantizar que las verificaciones de autorizaci\u00f3n tengan el alcance adecuado en las solicitudes de eliminaci\u00f3n de notificaciones de alerta de usuario. Los usuarios de Sentry SaaS no necesitan realizar ninguna acci\u00f3n. Los usuarios de Sentry alojado en servidores propios deben actualizar a la versi\u00f3n 24.9.0 o superior. No existen workarounds para esta vulnerabilidad." } ], "id": "CVE-2024-45605", "lastModified": "2024-09-26T19:14:00.873", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-09-17T20:15:05.120", "references": [ { "source": "security-advisories@github.com", "tags": [ "Product" ], "url": "https://github.com/getsentry/self-hosted" }, { "source": "security-advisories@github.com", "tags": [ "Issue Tracking", "Patch" ], "url": "https://github.com/getsentry/sentry/pull/77093" }, { "source": "security-advisories@github.com", "tags": [ "Vendor Advisory" ], "url": "https://github.com/getsentry/sentry/security/advisories/GHSA-54m3-95j9-v89j" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-639" } ], "source": "security-advisories@github.com", "type": "Primary" } ] }