CVE-2023-39349
Summary
| CVE | CVE-2023-39349 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2023-08-07 19:15:00 UTC |
| Updated | 2023-08-10 17:04:00 UTC |
| Description | Sentry is an error tracking and performance monitoring platform. Starting in version 22.1.0 and prior to version 23.7.2, an attacker with access to a token with few or no scopes can query `/api/0/api-tokens/` for a list of all tokens created by a user, including tokens with greater scopes, and use those tokens in other requests. There is no evidence that the issue was exploited on `sentry.io`. For self-hosted users, it is advised to rotate user auth tokens. A fix is available in version 23.7.2 of `sentry` and `self-hosted`. There are no known workarounds. |
Risk And Classification
Problem Types: CWE-287
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Release 23.7.2 · getsentry/self-hosted · GitHub | MISC | github.com | |
| SessionNoAuthTokenAuthentication custom authenticator by oioki · Pull Request #53850 · getsentry/sentry · GitHub | MISC | github.com | |
| SessionNoAuthTokenAuthentication custom authenticator (#53850) · getsentry/sentry@fad12c1 · GitHub | MISC | github.com | |
| Release 23.7.2 · getsentry/sentry · GitHub | MISC | github.com | |
| Privilege escalation via ApiTokensEndpoint · Advisory · getsentry/sentry · GitHub | MISC | github.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 994766 Python (Pip) Security Update for sentry (GHSA-9jcq-jf57-c62c)