Логотип exploitDog
bind: "CVE-2025-53099"
Консоль
Логотип exploitDog

exploitDog

bind: "CVE-2025-53099"

Количество 3

Количество 3

nvd логотип

CVE-2025-53099

9 месяцев назад

Sentry is a developer-first error tracking and performance monitoring tool. Prior to version 25.5.0, an attacker with a malicious OAuth application registered with Sentry can take advantage of a race condition and improper handling of authorization code within Sentry to maintain persistence to a user's account. With a specially timed requests and redirect flows, an attacker could generate multiple authorization codes that could be used to exchange for access and refresh tokens. This was possible even after de-authorizing the particular application. This issue has been patched in version 25.5.0. Self-hosted Sentry users should upgrade to version 25.5.0 or higher. Sentry SaaS users do not need to take any action.

CVSS3: 7.5
EPSS: Низкий
redos логотип

ROS-20260122-73-0006

3 месяца назад

Уязвимость python-sentry-sdk

EPSS: Низкий
fstec логотип

BDU:2026-03562

9 месяцев назад

Уязвимость протокола для авторизации и аутентификации OАuth программного обеспечения для создания отчетов о сбоях в режиме реального времени Sentry, позволяющая нарушителю обойти существующие ограничения безопасности

CVSS3: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-53099

Sentry is a developer-first error tracking and performance monitoring tool. Prior to version 25.5.0, an attacker with a malicious OAuth application registered with Sentry can take advantage of a race condition and improper handling of authorization code within Sentry to maintain persistence to a user's account. With a specially timed requests and redirect flows, an attacker could generate multiple authorization codes that could be used to exchange for access and refresh tokens. This was possible even after de-authorizing the particular application. This issue has been patched in version 25.5.0. Self-hosted Sentry users should upgrade to version 25.5.0 or higher. Sentry SaaS users do not need to take any action.

CVSS3: 7.5
0%
Низкий
9 месяцев назад
redos логотип
ROS-20260122-73-0006

Уязвимость python-sentry-sdk

0%
Низкий
3 месяца назад
fstec логотип
BDU:2026-03562

Уязвимость протокола для авторизации и аутентификации OАuth программного обеспечения для создания отчетов о сбоях в режиме реального времени Sentry, позволяющая нарушителю обойти существующие ограничения безопасности

CVSS3: 7.5
0%
Низкий
9 месяцев назад

Уязвимостей на страницу