Page 2 of 8 results (0.004 seconds)

CVSS: 2.0EPSS: 0%CPEs: 1EXPL: 0

Sentry is a developer-first error tracking and performance monitoring platform. Sentry's Slack integration incorrectly records the incoming request body in logs. This request data can contain sensitive information, including the deprecated Slack verification token. With this verification token, it is possible under specific configurations, an attacker can forge requests and act as the Slack integration. The request body is leaked in log entries matching `event == "slack.*" && name == "sentry.integrations.slack" && request_data == *`. • https://api.slack.com/authentication/verifying-requests-from-slack#app-management-updates https://api.slack.com/authentication/verifying-requests-from-slack#deprecation https://api.slack.com/authentication/verifying-requests-from-slack#regenerating https://develop.sentry.dev/integrations/slack https://github.com/getsentry/sentry/blob/17d2b87e39ccd57e11da4deed62971ff306253d1/src/sentry/conf/server.py#L1307 https://github.com/getsentry/sentry/pull/70508 https://github.com/getsentry/sentry/security/advisories/GHSA-c2g2-gx4j-rj3j • CWE-532: Insertion of Sensitive Information into Log File •

CVSS: 7.3EPSS: 0%CPEs: 1EXPL: 0

Sentry is an error tracking and performance monitoring platform. Prior to 24.4.1, when authenticating as a superuser to Sentry with a username and password, the password is leaked as cleartext in logs under the _event_: `auth-index.validate_superuser`. An attacker with access to the log data could use these leaked credentials to login to the Sentry system as superuser. Self-hosted users on affected versions should upgrade to 24.4.1 or later. Users can configure the logging level to exclude logs of the `INFO` level and only generate logs for levels at `WARNING` or more. • https://github.com/getsentry/sentry/commit/d5b34568d9f1c41362ccb62141532a0a2169512f https://github.com/getsentry/sentry/pull/66393 https://github.com/getsentry/sentry/pull/69148 https://github.com/getsentry/sentry/security/advisories/GHSA-6cjm-4pxw-7xp9 • CWE-117: Improper Output Neutralization for Logs CWE-312: Cleartext Storage of Sensitive Information •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

The numtok function in lib/raven/okjson.rb in the raven-ruby gem before 0.12.2 for Ruby allows remote attackers to cause a denial of service via a large exponent value in a scientific number. La función numtok en lib/raven/okjson.rb en la gema raven-ruby anterior a 0.12.2 para Ruby permite a atacantes remotos causar una denegación de servicio a través de un valor de exponente grande en un número científico. • http://seclists.org/oss-sec/2015/q1/26 https://exchange.xforce.ibmcloud.com/vulnerabilities/99687 https://github.com/getsentry/raven-ruby/commit/477ee93a3f735be33bc1e726820654cdf6e22d8f https://groups.google.com/forum/#%21topic/getsentry/Cz5bih0ZY1U • CWE-399: Resource Management Errors •