Page 2 of 10 results (0.003 seconds)

CVSS: 7.6EPSS: 0%CPEs: 1EXPL: 0

Sentry SDK is the official Python SDK for Sentry, real-time crash reporting software. When using the Django integration of versions prior to 1.14.0 of the Sentry SDK in a specific configuration it is possible to leak sensitive cookies values, including the session cookie to Sentry. These sensitive cookies could then be used by someone with access to your Sentry issues to impersonate or escalate their privileges within your application. In order for these sensitive values to be leaked, the Sentry SDK configuration must have `sendDefaultPII` set to `True`; one must use a custom name for either `SESSION_COOKIE_NAME` or `CSRF_COOKIE_NAME` in one's Django settings; and one must not be configured in one's organization or project settings to use Sentry's data scrubbing features to account for the custom cookie names. As of version 1.14.0, the Django integration of the `sentry-sdk` will detect the custom cookie names based on one's Django settings and will remove the values from the payload before sending the data to Sentry. As a workaround, use the SDK's filtering mechanism to remove the cookies from the payload that is sent to Sentry. For error events, this can be done with the `before_send` callback method and for performance related events (transactions) one can use the `before_send_transaction` callback method. • https://github.com/getsentry/sentry-python/pull/1842 https://github.com/getsentry/sentry-python/releases/tag/1.14.0 https://github.com/getsentry/sentry-python/security/advisories/GHSA-29pr-6jr8-q5jm • CWE-201: Insertion of Sensitive Information Into Sent Data CWE-209: Generation of Error Message Containing Sensitive Information •

CVSS: 6.4EPSS: 0%CPEs: 1EXPL: 0

Sentry is an error tracking and performance monitoring platform. In versions of the sentry python library prior to 22.11.0 an attacker with a known valid invite link could manipulate a cookie to allow the same invite link to be reused on multiple accounts when joining an organization. As a result an attacker with a valid invite link can create multiple users and join an organization they may not have been originally invited to. This issue was patched in version 22.11.0. Sentry SaaS customers do not need to take action. • https://github.com/getsentry/sentry/security/advisories/GHSA-jv85-mqxj-3f9j • CWE-269: Improper Privilege Management CWE-284: Improper Access Control •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 1

The WP Sentry WordPress plugin through 1.0 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack and lead to Stored Cross-Site Scripting due to the lack of sanitisation and escaping as well El plugin WP Sentry de WordPress versiones hasta 1.0, no presenta comprobación de CSRF cuando es actualizada su configuración, lo que podría permitir a atacantes hacer que un administrador conectado los cambie por medio de un ataque de tipo CSRF y conllevar a un ataque d tipo Cross-Site Scripting Almacenado debido a una falta de saneo y escape también • https://wpscan.com/vulnerability/f0b0baac-7f44-44e1-af73-5a72b967858d • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 5.0EPSS: 4%CPEs: 1EXPL: 4

The FxIAList service in ASG-Sentry Network Manager 7.0.0 and earlier does require authentication, which allows remote attackers to cause a denial of service (service termination) via the exit command to TCP port 6162, or have other impacts via other commands. El servicio FxIAList de ASG-Sentry Network Manager versión 7.0.0 y anteriores implementa mecanismo de autenticación que permite a atacantes remotos provocar una denegación de servicio (finalización del servicio) mediante la utilización del comando exit en el puerto 6162 TCP y tiene otras consecuencias al utilizar otros comandos. • https://www.exploit-db.com/exploits/5229 http://aluigi.altervista.org/adv/asgulo-adv.txt http://secunia.com/advisories/29289 http://securityreason.com/securityalert/3737 http://www.securityfocus.com/archive/1/489359/100/0/threaded http://www.securityfocus.com/bid/28188 http://www.vupen.com/english/advisories/2008/0839/references https://exchange.xforce.ibmcloud.com/vulnerabilities/41084 • CWE-287: Improper Authentication •

CVSS: 7.8EPSS: 5%CPEs: 1EXPL: 4

The File Check Utility (fcheck.exe) in ASG-Sentry Network Manager 7.0.0 and earlier allows remote attackers to cause a denial of service (CPU consumption) or overwrite arbitrary files via a query string that specifies the -b option, probably due to an argument injection vulnerability. La utilidad de evaluación de ficheros (fcheck.exe) en ASG-Sentry Network Manager versión 7.0.0 y anteriores permite a atacantes remotos provocar una denegación de servicio (consumo de CPU) o sobreescribir ficheros de su elección mediante una cadena de consulta que especifique la opción -b, probablemente debido a una vulnerabilidad de inyección de argumento. • https://www.exploit-db.com/exploits/5229 http://aluigi.altervista.org/adv/asgulo-adv.txt http://secunia.com/advisories/29289 http://securityreason.com/securityalert/3737 http://www.securityfocus.com/archive/1/489359/100/0/threaded http://www.securityfocus.com/bid/28188 http://www.vupen.com/english/advisories/2008/0839/references https://exchange.xforce.ibmcloud.com/vulnerabilities/41080 •