Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-4xqm-4p72-87h6

Опубликовано: 06 июл. 2023
Источник: github
Github: Прошло ревью
CVSS3: 6.8

Описание

Sentry CORS misconfiguration

Impact

The Sentry API incorrectly returns the access-control-allow-credentials: true HTTP header if the Origin request header ends with the system.base-hostname option of Sentry installation. This only affects installations that have system.base-hostname option explicitly set, as it is empty by default.

Impact is limited since recent versions of major browsers have cross-site cookie blocking enabled by default. However, this flaw could allow other multi-step attacks.

Patches

The patch has been released in Sentry 23.6.2.

Workarounds

For Sentry SaaS customers, no action is needed.

For self-hosted Sentry installations that have system.base-hostname explicitly set, it is recommended to upgrade the installation to 23.6.2 or higher. There are no known workarounds.

References

Credits

Пакеты

Наименование

sentry

pip
Затронутые версииВерсия исправления

>= 23.6.0, < 23.6.2

23.6.2

EPSS

Процентиль: 36%
0.0015
Низкий

6.8 Medium

CVSS3

Дефекты

CWE-697
CWE-863
CWE-942

Связанные уязвимости

CVSS3: 6.8
nvd
больше 2 лет назад

Sentry is an error tracking and performance monitoring platform. Starting in version 23.6.0 and prior to version 23.6.2, the Sentry API incorrectly returns the `access-control-allow-credentials: true` HTTP header if the `Origin` request header ends with the `system.base-hostname` option of Sentry installation. This only affects installations that have `system.base-hostname` option explicitly set, as it is empty by default. Impact is limited since recent versions of major browsers have cross-site cookie blocking enabled by default. However, this flaw could allow other multi-step attacks. The patch has been released in Sentry 23.6.2.

EPSS

Процентиль: 36%
0.0015
Низкий

6.8 Medium

CVSS3

Дефекты

CWE-697
CWE-863
CWE-942