Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-x3v3-8xg8-8v72

Опубликовано: 18 дек. 2023
Источник: github
Github: Прошло ревью
CVSS3: 7.5

Описание

Sentry's Astro SDK vulnerable to ReDoS

Impact

A ReDoS (Regular expression Denial of Service) vulnerability has been identified in Sentry's Astro SDK 7.78.0-7.86.0. Under certain conditions, this vulnerability allows an attacker to cause excessive computation times on the server, leading to denial of service (DoS).

Applications that are using Sentry's Astro SDK are affected if:

  1. They're using Sentry instrumentation:
  2. They have configured routes with at least two path params (e.g. /foo/[p1]/bar/[p2]).

Patches

The problem has been patched in @sentry/astro@7.87.0. The corresponding PR: https://github.com/getsentry/sentry-javascript/pull/9815

Workarounds

We strongly recommend upgrading to the latest SDK version. However, if it's not possible, the steps to mitigate the vulnerability without upgrade are:

After these changes, Sentry error reporting will still be functional, but some details such as server-side transactions (and consequently, distributed traces between client and server) will be omitted. We therefore still recommend to update to 7.87.0 as soon as you can.

References

Пакеты

Наименование

@sentry/astro

npm
Затронутые версииВерсия исправления

>= 7.78.0, < 7.87.0

7.87.0

EPSS

Процентиль: 39%
0.00171
Низкий

7.5 High

CVSS3

Дефекты

CWE-1333
CWE-400

Связанные уязвимости

CVSS3: 7.5
nvd
около 2 лет назад

Sentry-Javascript is official Sentry SDKs for JavaScript. A ReDoS (Regular expression Denial of Service) vulnerability has been identified in Sentry's Astro SDK 7.78.0-7.86.0. Under certain conditions, this vulnerability allows an attacker to cause excessive computation times on the server, leading to denial of service (DoS). This vulnerability has been patched in sentry/astro version 7.87.0.

EPSS

Процентиль: 39%
0.00171
Низкий

7.5 High

CVSS3

Дефекты

CWE-1333
CWE-400