10 results (0.017 seconds)

CVSS: 5.3EPSS: 0%CPEs: 1EXPL: 0

08 Feb 2024 — Sentry is an error tracking and performance monitoring platform. Sentry’s integration platform provides a way for external services to interact with Sentry. One of such integrations, the Phabricator integration (maintained by Sentry) with version <=24.1.1 contains a constrained SSRF vulnerability. An attacker could make Sentry send POST HTTP requests to arbitrary URLs (including internal IP addresses) by providing an unsanitized input to the Phabricator integration. However, the body payload is constrained ... • https://github.com/getsentry/self-hosted/releases/tag/24.1.2 • CWE-918: Server-Side Request Forgery (SSRF) •

CVSS: 9.3EPSS: 0%CPEs: 1EXPL: 0

10 Nov 2023 — sentry-javascript provides Sentry SDKs for JavaScript. An unsanitized input of Next.js SDK tunnel endpoint allows sending HTTP requests to arbitrary URLs and reflecting the response back to the user. This issue only affects users who have Next.js SDK tunneling feature enabled. The problem has been fixed in version 7.77.0. sentry-javascript proporciona SDK de Sentry para JavaScript. Una entrada no sanitizada del endpoint del túnel SDK de Next.js permite enviar solicitudes HTTP a URL arbitrarias y reflejar la... • https://github.com/getsentry/sentry-javascript/commit/ddbda3c02c35aba8c5235e0cf07fc5bf656f81be • CWE-918: Server-Side Request Forgery (SSRF) •

CVSS: 6.8EPSS: 0%CPEs: 1EXPL: 0

09 Aug 2023 — Sentry is an error tracking and performance monitoring platform. Starting in version 10.0.0 and prior to version 23.7.2, an attacker with sufficient client-side exploits could retrieve a valid access token for another user during the OAuth token exchange due to incorrect credential validation. The client ID must be known and the API application must have already been authorized on the targeted user account. Sentry SaaS customers do not need to take any action. Self-hosted installations should upgrade to ver... • https://github.com/getsentry/sentry/security/advisories/GHSA-hgj4-h2x3-rfx4 • CWE-287: Improper Authentication •

CVSS: 8.5EPSS: 0%CPEs: 1EXPL: 1

07 Aug 2023 — Sentry is an error tracking and performance monitoring platform. Starting in version 22.1.0 and prior to version 23.7.2, an attacker with access to a token with few or no scopes can query `/api/0/api-tokens/` for a list of all tokens created by a user, including tokens with greater scopes, and use those tokens in other requests. There is no evidence that the issue was exploited on `sentry.io`. For self-hosted users, it is advised to rotate user auth tokens. A fix is available in version 23.7.2 of `sentry` a... • https://github.com/getsentry/self-hosted/releases/tag/23.7.2 • CWE-284: Improper Access Control CWE-287: Improper Authentication •

CVSS: 7.7EPSS: 0%CPEs: 1EXPL: 0

25 Jul 2023 — Sentry is an error tracking and performance monitoring platform. Starting in version 8.21.0 and prior to version 23.5.2, an authenticated user can download a debug or artifact bundle from arbitrary organizations and projects with a known bundle ID. The user does not need to be a member of the organization or have permissions on the project. A patch was issued in version 23.5.2 to ensure authorization checks are properly scoped on requests to retrieve debug or artifact bundles. Authenticated users who do not... • https://github.com/getsentry/sentry/commit/e932b15435bf36239431eaa3790a6bcfa47046a9 • CWE-285: Improper Authorization CWE-863: Incorrect Authorization •

CVSS: 7.6EPSS: 0%CPEs: 1EXPL: 0

22 Mar 2023 — Sentry SDK is the official Python SDK for Sentry, real-time crash reporting software. When using the Django integration of versions prior to 1.14.0 of the Sentry SDK in a specific configuration it is possible to leak sensitive cookies values, including the session cookie to Sentry. These sensitive cookies could then be used by someone with access to your Sentry issues to impersonate or escalate their privileges within your application. In order for these sensitive values to be leaked, the Sentry SDK configu... • https://github.com/getsentry/sentry-python/pull/1842 • CWE-201: Insertion of Sensitive Information Into Sent Data CWE-209: Generation of Error Message Containing Sensitive Information •

CVSS: 6.4EPSS: 0%CPEs: 1EXPL: 0

10 Dec 2022 — Sentry is an error tracking and performance monitoring platform. In versions of the sentry python library prior to 22.11.0 an attacker with a known valid invite link could manipulate a cookie to allow the same invite link to be reused on multiple accounts when joining an organization. As a result an attacker with a valid invite link can create multiple users and join an organization they may not have been originally invited to. This issue was patched in version 22.11.0. Sentry SaaS customers do not need to ... • https://github.com/getsentry/sentry/security/advisories/GHSA-jv85-mqxj-3f9j • CWE-269: Improper Privilege Management CWE-284: Improper Access Control •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 1

31 May 2022 — The WP Sentry WordPress plugin through 1.0 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack and lead to Stored Cross-Site Scripting due to the lack of sanitisation and escaping as well El plugin WP Sentry de WordPress versiones hasta 1.0, no presenta comprobación de CSRF cuando es actualizada su configuración, lo que podría permitir a atacantes hacer que un administrador conectado los cambie por medio de un ataq... • https://wpscan.com/vulnerability/f0b0baac-7f44-44e1-af73-5a72b967858d • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 7.5EPSS: 16%CPEs: 1EXPL: 4

13 Mar 2008 — The FxIAList service in ASG-Sentry Network Manager 7.0.0 and earlier does require authentication, which allows remote attackers to cause a denial of service (service termination) via the exit command to TCP port 6162, or have other impacts via other commands. El servicio FxIAList de ASG-Sentry Network Manager versión 7.0.0 y anteriores implementa mecanismo de autenticación que permite a atacantes remotos provocar una denegación de servicio (finalización del servicio) mediante la utilización del comando exit... • https://www.exploit-db.com/exploits/5229 • CWE-287: Improper Authentication •

CVSS: 9.1EPSS: 10%CPEs: 1EXPL: 4

13 Mar 2008 — The File Check Utility (fcheck.exe) in ASG-Sentry Network Manager 7.0.0 and earlier allows remote attackers to cause a denial of service (CPU consumption) or overwrite arbitrary files via a query string that specifies the -b option, probably due to an argument injection vulnerability. La utilidad de evaluación de ficheros (fcheck.exe) en ASG-Sentry Network Manager versión 7.0.0 y anteriores permite a atacantes remotos provocar una denegación de servicio (consumo de CPU) o sobreescribir ficheros de su elecci... • https://www.exploit-db.com/exploits/5229 •