Lucene search

K
githubGitHub Advisory DatabaseGHSA-G92J-QHMH-64V2
HistoryJul 18, 2024 - 5:18 p.m.

Sentry's Python SDK unintentionally exposes environment variables to subprocesses

2024-07-1817:18:46
CWE-200
GitHub Advisory Database
github.com
7
sentry
python
sdk
subprocesses
environment variables
bug
security
patch
fix
upgrade
integration
stdlib
workaround
application
child processes
python docs
sentry docs
patch

CVSS3

5.3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N

AI Score

5.2

Confidence

High

EPSS

0

Percentile

10.6%

Impact

The bug in Sentry’s Python SDK <2.8.0 results in the unintentional exposure of environment variables to subprocesses despite the env={} setting.

Details

In Python’s subprocess calls, all environment variables are passed to subprocesses by default. However, if you specifically do not want them to be passed to subprocesses, you may use env argument in subprocess calls, like in this example:

&gt;&gt;&gt; subprocess.check_output(["env"], env={"TEST":"1"})
b'TEST=1\n'

If you’d want to not pass any variables, you can set an empty dict:

&gt;&gt;&gt; subprocess.check_output(["env"], env={})
b''

However, the bug in Sentry SDK <2.8.0 causes all environment variables to be passed to the subprocesses when env={} is set, unless the Sentry SDK’s Stdlib integration is disabled. The Stdlib integration is enabled by default.

Patches

The issue has been patched in https://github.com/getsentry/sentry-python/pull/3251 and the fix released in sentry-sdk==2.8.0. The fix was also backported to sentry-sdk==1.45.1.

Workarounds

We strongly recommend upgrading to the latest SDK version. However, if it’s not possible, and if passing environment variables to child processes poses a security risk for you, there are two options:

  1. In your application, replace env={} with the minimal dict env={"EMPTY_ENV":"1"} or similar.

OR

  1. Disable Stdlib integration:
import sentry_sdk

# Should go before sentry_sdk.init
sentry_sdk.integrations._DEFAULT_INTEGRATIONS.remove("sentry_sdk.integrations.stdlib.StdlibIntegration")

sentry_sdk.init(...)

References

Affected configurations

Vulners
Node
sentrysdkRange<2.8.0
VendorProductVersionCPE
sentrysdk*cpe:2.3:a:sentry:sdk:*:*:*:*:*:*:*:*

CVSS3

5.3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N

AI Score

5.2

Confidence

High

EPSS

0

Percentile

10.6%