Page 2 of 13 results (0.004 seconds)

CVSS: 8.1EPSS: 0%CPEs: 1EXPL: 1

Sentry is an error tracking and performance monitoring platform. Starting in version 22.1.0 and prior to version 23.7.2, an attacker with access to a token with few or no scopes can query `/api/0/api-tokens/` for a list of all tokens created by a user, including tokens with greater scopes, and use those tokens in other requests. There is no evidence that the issue was exploited on `sentry.io`. For self-hosted users, it is advised to rotate user auth tokens. A fix is available in version 23.7.2 of `sentry` and `self-hosted`. • https://github.com/getsentry/self-hosted/releases/tag/23.7.2 https://github.com/getsentry/sentry/commit/fad12c1150d1135edf9666ea72ca11bc110c1083 https://github.com/getsentry/sentry/pull/53850 https://github.com/getsentry/sentry/releases/tag/23.7.2 https://github.com/getsentry/sentry/security/advisories/GHSA-9jcq-jf57-c62c • CWE-284: Improper Access Control CWE-287: Improper Authentication •

CVSS: 7.7EPSS: 0%CPEs: 1EXPL: 0

Sentry is an error tracking and performance monitoring platform. Starting in version 8.21.0 and prior to version 23.5.2, an authenticated user can download a debug or artifact bundle from arbitrary organizations and projects with a known bundle ID. The user does not need to be a member of the organization or have permissions on the project. A patch was issued in version 23.5.2 to ensure authorization checks are properly scoped on requests to retrieve debug or artifact bundles. Authenticated users who do not have the necessary permissions on the particular project are no longer able to download them. • https://github.com/getsentry/sentry/commit/e932b15435bf36239431eaa3790a6bcfa47046a9 https://github.com/getsentry/sentry/pull/49680 https://github.com/getsentry/sentry/security/advisories/GHSA-m4hc-m2v6-hfw8 • CWE-285: Improper Authorization CWE-863: Incorrect Authorization •

CVSS: 6.8EPSS: 0%CPEs: 1EXPL: 0

Sentry is an error tracking and performance monitoring platform. Starting in version 23.6.0 and prior to version 23.6.2, the Sentry API incorrectly returns the `access-control-allow-credentials: true` HTTP header if the `Origin` request header ends with the `system.base-hostname` option of Sentry installation. This only affects installations that have `system.base-hostname` option explicitly set, as it is empty by default. Impact is limited since recent versions of major browsers have cross-site cookie blocking enabled by default. However, this flaw could allow other multi-step attacks. • https://github.com/getsentry/self-hosted/releases/tag/23.6.2 https://github.com/getsentry/sentry/commit/ee44c6be35e5e464bc40637580f39867898acd8b https://github.com/getsentry/sentry/pull/52276 https://github.com/getsentry/sentry/security/advisories/GHSA-4xqm-4p72-87h6 • CWE-697: Incorrect Comparison CWE-863: Incorrect Authorization CWE-942: Permissive Cross-domain Policy with Untrusted Domains •

CVSS: 6.4EPSS: 0%CPEs: 1EXPL: 0

Sentry is an error tracking and performance monitoring platform. In versions of the sentry python library prior to 22.11.0 an attacker with a known valid invite link could manipulate a cookie to allow the same invite link to be reused on multiple accounts when joining an organization. As a result an attacker with a valid invite link can create multiple users and join an organization they may not have been originally invited to. This issue was patched in version 22.11.0. Sentry SaaS customers do not need to take action. • https://github.com/getsentry/sentry/security/advisories/GHSA-jv85-mqxj-3f9j • CWE-269: Improper Privilege Management CWE-284: Improper Access Control •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 1

Telestream Tektronix Medius before 10.7.5 and Sentry before 10.7.5 have a SQL injection vulnerability allowing an unauthenticated attacker to dump database contents via the page parameter in a page=login request to index.php (aka the server login page). Telestream Tektronix Medius versiones anteriores a 10.7.5 y Sentry versiones anteriores a 10.7.5, presentan una vulnerabilidad de inyección SQL que permite a un atacante no autenticado volcar el contenido de la base de datos por medio del parámetro page en una petición page=login hacia el archivo index.php (también se conoce como la página de inicio de sesión del servidor) • https://github.com/google/security-research/security/advisories/GHSA-g69r-8jwh-2462 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •