Логотип exploitDog
bind: "CVE-2024-53253"
Консоль
Логотип exploitDog

exploitDog

bind: "CVE-2024-53253"

Количество 4

Количество 4

nvd логотип

CVE-2024-53253

около 1 года назад

Sentry is an error tracking and performance monitoring platform. Version 24.11.0, and only version 24.11.0, is vulnerable to a scenario where a specific error message generated by the Sentry platform could include a plaintext Client ID and Client Secret for an application integration. The Client ID and Client Secret would not be displayed in the UI, but would be returned in the underlying HTTP response to the end user. This could occur under the following conditions: An app installation made use of a Search UI component with the `async` flag set to true (default: true); auser types types into the Search Component which creates a request to the third-party for search or query results; and that third-party response may then fail validation and Sentry would return the `select-requester.invalid-response` error code along with a serialized version of a Sentry application containing the integration Client Secret. Should this error be found, it's reasonable to assume the potential exposure of

CVSS3: 5.3
EPSS: Низкий
redos логотип

ROS-20260122-73-0004

13 дней назад

Уязвимость python-sentry-sdk

CVSS3: 5.3
EPSS: Низкий
github логотип

GHSA-v5h2-q2w4-gpcx

около 1 года назад

Sentry improper error handling leaks Application Integration Client Secret

CVSS3: 5.3
EPSS: Низкий
fstec логотип

BDU:2026-01024

около 1 года назад

Уязвимость библиотеки клиентских инструментов для платформы мониторинга sentry-sdk, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

CVSS3: 5.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-53253

Sentry is an error tracking and performance monitoring platform. Version 24.11.0, and only version 24.11.0, is vulnerable to a scenario where a specific error message generated by the Sentry platform could include a plaintext Client ID and Client Secret for an application integration. The Client ID and Client Secret would not be displayed in the UI, but would be returned in the underlying HTTP response to the end user. This could occur under the following conditions: An app installation made use of a Search UI component with the `async` flag set to true (default: true); auser types types into the Search Component which creates a request to the third-party for search or query results; and that third-party response may then fail validation and Sentry would return the `select-requester.invalid-response` error code along with a serialized version of a Sentry application containing the integration Client Secret. Should this error be found, it's reasonable to assume the potential exposure of

CVSS3: 5.3
0%
Низкий
около 1 года назад
redos логотип
ROS-20260122-73-0004

Уязвимость python-sentry-sdk

CVSS3: 5.3
0%
Низкий
13 дней назад
github логотип
GHSA-v5h2-q2w4-gpcx

Sentry improper error handling leaks Application Integration Client Secret

CVSS3: 5.3
0%
Низкий
около 1 года назад
fstec логотип
BDU:2026-01024

Уязвимость библиотеки клиентских инструментов для платформы мониторинга sentry-sdk, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

CVSS3: 5.3
0%
Низкий
около 1 года назад

Уязвимостей на страницу