icon

We found results for “

CVE-2023-39349

Good to know:

icon

Date: August 7, 2023

Sentry is an error tracking and performance monitoring platform. Starting in version 22.1.0 and prior to version 23.7.2, an attacker with access to a token with few or no scopes can query "/api/0/api-tokens/" for a list of all tokens created by a user, including tokens with greater scopes, and use those tokens in other requests. There is no evidence that the issue was exploited on "sentry.io". For self-hosted users, it is advised to rotate user auth tokens. A fix is available in version 23.7.2 of "sentry" and "self-hosted". There are no known workarounds.

Language: Python

Severity Score

Severity Score

Weakness Type (CWE)

Improper Authentication

CWE-287

Improper Access Control

CWE-284

CVSS v3.1

Base Score:
Attack Vector (AV): NETWORK
Attack Complexity (AC): LOW
Privileges Required (PR): LOW
User Interaction (UI): NONE
Scope (S): UNCHANGED
Confidentiality (C): HIGH
Integrity (I): HIGH
Availability (A): NONE

Do you need more information?

Contact Us