Sentry is an error tracking and performance monitoring platform. Starting in version 23.6.0 and prior to version 23.6.2, the Sentry API incorrectly returns the `access-control-allow-credentials: true` HTTP header if the `Origin` request header ends with the `system.base-hostname` option of Sentry installation. This only affects installations that have `system.base-hostname` option explicitly set, as it is empty by default. Impact is limited since recent versions of major browsers have cross-site cookie blocking enabled by default. However, this flaw could allow other multi-step attacks. The patch has been released in Sentry 23.6.2.
References
Configurations
History
17 Jul 2023, 18:56
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:functional:sentry:*:*:*:*:*:*:*:* | |
CWE | CWE-942 |
CWE-697 |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.4 |
References | (MISC) https://github.com/getsentry/sentry/pull/52276 - Patch | |
References | (MISC) https://github.com/getsentry/self-hosted/releases/tag/23.6.2 - Release Notes | |
References | (MISC) https://github.com/getsentry/sentry/commit/ee44c6be35e5e464bc40637580f39867898acd8b - Patch | |
References | (MISC) https://github.com/getsentry/sentry/security/advisories/GHSA-4xqm-4p72-87h6 - Patch |
06 Jul 2023, 23:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-07-06 23:15
Updated : 2024-02-04 23:37
NVD link : CVE-2023-36829
Mitre link : CVE-2023-36829
CVE.ORG link : CVE-2023-36829
JSON object : View
Products Affected
functional
- sentry