Описание
Sentry is an error tracking and performance monitoring platform. Starting in version 22.1.0 and prior to version 23.7.2, an attacker with access to a token with few or no scopes can query /api/0/api-tokens/ for a list of all tokens created by a user, including tokens with greater scopes, and use those tokens in other requests. There is no evidence that the issue was exploited on sentry.io. For self-hosted users, it is advised to rotate user auth tokens. A fix is available in version 23.7.2 of sentry and self-hosted. There are no known workarounds.
Ссылки
- Release Notes
- Patch
- Patch
- Release Notes
- ExploitPatchThird Party Advisory
- Release Notes
- Patch
- Patch
- Release Notes
- ExploitPatchThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия от 22.1.0 (включая) до 23.7.2 (исключая)
cpe:2.3:a:sentry:sentry:*:*:*:*:*:*:*:*
EPSS
Процентиль: 24%
0.0008
Низкий
8.1 High
CVSS3
Дефекты
CWE-284
Связанные уязвимости
EPSS
Процентиль: 24%
0.0008
Низкий
8.1 High
CVSS3
Дефекты
CWE-284