
We found results for “”
CVE-2023-39349
Good to know:

Date: August 7, 2023
Sentry is an error tracking and performance monitoring platform. Starting in version 22.1.0 and prior to version 23.7.2, an attacker with access to a token with few or no scopes can query "/api/0/api-tokens/" for a list of all tokens created by a user, including tokens with greater scopes, and use those tokens in other requests. There is no evidence that the issue was exploited on "sentry.io". For self-hosted users, it is advised to rotate user auth tokens. A fix is available in version 23.7.2 of "sentry" and "self-hosted". There are no known workarounds.
Language: Python
Severity Score
Related Resources (8)
Severity Score
CVSS v3.1
Base Score: |
|
---|---|
Attack Vector (AV): | NETWORK |
Attack Complexity (AC): | LOW |
Privileges Required (PR): | LOW |
User Interaction (UI): | NONE |
Scope (S): | UNCHANGED |
Confidentiality (C): | HIGH |
Integrity (I): | HIGH |
Availability (A): | NONE |