Логотип exploitDog
bind:CVE-2023-28117
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-28117

Количество 5

Количество 5

ubuntu логотип

CVE-2023-28117

больше 2 лет назад

Sentry SDK is the official Python SDK for Sentry, real-time crash reporting software. When using the Django integration of versions prior to 1.14.0 of the Sentry SDK in a specific configuration it is possible to leak sensitive cookies values, including the session cookie to Sentry. These sensitive cookies could then be used by someone with access to your Sentry issues to impersonate or escalate their privileges within your application. In order for these sensitive values to be leaked, the Sentry SDK configuration must have `sendDefaultPII` set to `True`; one must use a custom name for either `SESSION_COOKIE_NAME` or `CSRF_COOKIE_NAME` in one's Django settings; and one must not be configured in one's organization or project settings to use Sentry's data scrubbing features to account for the custom cookie names. As of version 1.14.0, the Django integration of the `sentry-sdk` will detect the custom cookie names based on one's Django settings and will remove the values from the payload...

CVSS3: 7.6
EPSS: Низкий
nvd логотип

CVE-2023-28117

больше 2 лет назад

Sentry SDK is the official Python SDK for Sentry, real-time crash reporting software. When using the Django integration of versions prior to 1.14.0 of the Sentry SDK in a specific configuration it is possible to leak sensitive cookies values, including the session cookie to Sentry. These sensitive cookies could then be used by someone with access to your Sentry issues to impersonate or escalate their privileges within your application. In order for these sensitive values to be leaked, the Sentry SDK configuration must have `sendDefaultPII` set to `True`; one must use a custom name for either `SESSION_COOKIE_NAME` or `CSRF_COOKIE_NAME` in one's Django settings; and one must not be configured in one's organization or project settings to use Sentry's data scrubbing features to account for the custom cookie names. As of version 1.14.0, the Django integration of the `sentry-sdk` will detect the custom cookie names based on one's Django settings and will remove the values from the payload

CVSS3: 7.6
EPSS: Низкий
redos логотип

ROS-20241021-05

8 месяцев назад

Уязвимость python3-sentry-sdk

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-29pr-6jr8-q5jm

больше 2 лет назад

Sentry SDK leaks sensitive session information when `sendDefaultPII` is set to `True`

CVSS3: 7.6
EPSS: Низкий
fstec логотип

BDU:2024-08616

больше 2 лет назад

Уязвимость программного обеспечения для создания отчетов о сбоях в режиме реального времени Sentry, связанная с вставкой конфиденциальной информации в отправляемые данные, позволяющая нарушителю получить доступ к конфиденциальной информации

CVSS3: 7.6
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2023-28117

Sentry SDK is the official Python SDK for Sentry, real-time crash reporting software. When using the Django integration of versions prior to 1.14.0 of the Sentry SDK in a specific configuration it is possible to leak sensitive cookies values, including the session cookie to Sentry. These sensitive cookies could then be used by someone with access to your Sentry issues to impersonate or escalate their privileges within your application. In order for these sensitive values to be leaked, the Sentry SDK configuration must have `sendDefaultPII` set to `True`; one must use a custom name for either `SESSION_COOKIE_NAME` or `CSRF_COOKIE_NAME` in one's Django settings; and one must not be configured in one's organization or project settings to use Sentry's data scrubbing features to account for the custom cookie names. As of version 1.14.0, the Django integration of the `sentry-sdk` will detect the custom cookie names based on one's Django settings and will remove the values from the payload...

CVSS3: 7.6
0%
Низкий
больше 2 лет назад
nvd логотип
CVE-2023-28117

Sentry SDK is the official Python SDK for Sentry, real-time crash reporting software. When using the Django integration of versions prior to 1.14.0 of the Sentry SDK in a specific configuration it is possible to leak sensitive cookies values, including the session cookie to Sentry. These sensitive cookies could then be used by someone with access to your Sentry issues to impersonate or escalate their privileges within your application. In order for these sensitive values to be leaked, the Sentry SDK configuration must have `sendDefaultPII` set to `True`; one must use a custom name for either `SESSION_COOKIE_NAME` or `CSRF_COOKIE_NAME` in one's Django settings; and one must not be configured in one's organization or project settings to use Sentry's data scrubbing features to account for the custom cookie names. As of version 1.14.0, the Django integration of the `sentry-sdk` will detect the custom cookie names based on one's Django settings and will remove the values from the payload

CVSS3: 7.6
0%
Низкий
больше 2 лет назад
redos логотип
ROS-20241021-05

Уязвимость python3-sentry-sdk

CVSS3: 6.5
0%
Низкий
8 месяцев назад
github логотип
GHSA-29pr-6jr8-q5jm

Sentry SDK leaks sensitive session information when `sendDefaultPII` is set to `True`

CVSS3: 7.6
0%
Низкий
больше 2 лет назад
fstec логотип
BDU:2024-08616

Уязвимость программного обеспечения для создания отчетов о сбоях в режиме реального времени Sentry, связанная с вставкой конфиденциальной информации в отправляемые данные, позволяющая нарушителю получить доступ к конфиденциальной информации

CVSS3: 7.6
0%
Низкий
больше 2 лет назад

Уязвимостей на страницу