Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2023-28117

Опубликовано: 22 мар. 2023
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS3: 7.6

Описание

Sentry SDK is the official Python SDK for Sentry, real-time crash reporting software. When using the Django integration of versions prior to 1.14.0 of the Sentry SDK in a specific configuration it is possible to leak sensitive cookies values, including the session cookie to Sentry. These sensitive cookies could then be used by someone with access to your Sentry issues to impersonate or escalate their privileges within your application. In order for these sensitive values to be leaked, the Sentry SDK configuration must have sendDefaultPII set to True; one must use a custom name for either SESSION_COOKIE_NAME or CSRF_COOKIE_NAME in one's Django settings; and one must not be configured in one's organization or project settings to use Sentry's data scrubbing features to account for the custom cookie names. As of version 1.14.0, the Django integration of the sentry-sdk will detect the custom cookie names based on one's Django settings and will remove the values from the payload...

РелизСтатусПримечание
bionic

DNE

devel

needs-triage

esm-apps/focal

needs-triage

esm-apps/jammy

needs-triage

esm-apps/noble

needs-triage

focal

ignored

end of standard support, was needs-triage
jammy

needs-triage

kinetic

ignored

end of life, was needs-triage
lunar

ignored

end of life, was needs-triage
mantic

ignored

end of life, was needs-triage

Показывать по

EPSS

Процентиль: 35%
0.0014
Низкий

7.6 High

CVSS3

Связанные уязвимости

CVSS3: 7.6
nvd
больше 2 лет назад

Sentry SDK is the official Python SDK for Sentry, real-time crash reporting software. When using the Django integration of versions prior to 1.14.0 of the Sentry SDK in a specific configuration it is possible to leak sensitive cookies values, including the session cookie to Sentry. These sensitive cookies could then be used by someone with access to your Sentry issues to impersonate or escalate their privileges within your application. In order for these sensitive values to be leaked, the Sentry SDK configuration must have `sendDefaultPII` set to `True`; one must use a custom name for either `SESSION_COOKIE_NAME` or `CSRF_COOKIE_NAME` in one's Django settings; and one must not be configured in one's organization or project settings to use Sentry's data scrubbing features to account for the custom cookie names. As of version 1.14.0, the Django integration of the `sentry-sdk` will detect the custom cookie names based on one's Django settings and will remove the values from the payload

CVSS3: 6.5
redos
8 месяцев назад

Уязвимость python3-sentry-sdk

CVSS3: 7.6
github
больше 2 лет назад

Sentry SDK leaks sensitive session information when `sendDefaultPII` is set to `True`

CVSS3: 7.6
fstec
больше 2 лет назад

Уязвимость программного обеспечения для создания отчетов о сбоях в режиме реального времени Sentry, связанная с вставкой конфиденциальной информации в отправляемые данные, позволяющая нарушителю получить доступ к конфиденциальной информации

EPSS

Процентиль: 35%
0.0014
Низкий

7.6 High

CVSS3