Lucene search

K
cvelistGitHub_MCVELIST:CVE-2023-46729
HistoryNov 10, 2023 - 12:57 a.m.

CVE-2023-46729 Sentry Next.js vulnerable to SSRF via Next.js SDK tunnel endpoint

2023-11-1000:57:15
CWE-918
GitHub_M
www.cve.org
cve-2023-46729
sentry next.js
ssrf vulnerability
javascript sdk
unsanitized input
next.js sdk tunnel endpoint
http requests
arbitrary urls
fixed version 7.77.0
tunneling feature

9.3 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N

9.5 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

20.8%

sentry-javascript provides Sentry SDKs for JavaScript. An unsanitized input of Next.js SDK tunnel endpoint allows sending HTTP requests to arbitrary URLs and reflecting the response back to the user. This issue only affects users who have Next.js SDK tunneling feature enabled. The problem has been fixed in version 7.77.0.

CNA Affected

[
  {
    "vendor": "getsentry",
    "product": "sentry-javascript",
    "versions": [
      {
        "version": ">= 7.26.0, < 7.77.0",
        "status": "affected"
      }
    ]
  }
]

9.3 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N

9.5 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

20.8%

Related for CVELIST:CVE-2023-46729