CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
AI Score
Confidence
High
SSVC
Exploitation
none
Automatable
no
Technical Impact
total
Sentry is an error tracking and performance monitoring platform. Starting in version 22.1.0 and prior to version 23.7.2, an attacker with access to a token with few or no scopes can query /api/0/api-tokens/
for a list of all tokens created by a user, including tokens with greater scopes, and use those tokens in other requests. There is no evidence that the issue was exploited on sentry.io
. For self-hosted users, it is advised to rotate user auth tokens. A fix is available in version 23.7.2 of sentry
and self-hosted
. There are no known workarounds.
[
{
"cpes": [
"cpe:2.3:a:getsentry:sentry:*:*:*:*:*:*:*:*"
],
"vendor": "getsentry",
"product": "sentry",
"versions": [
{
"status": "affected",
"version": "22.1.0",
"lessThan": "23.7.2",
"versionType": "custom"
}
],
"defaultStatus": "unknown"
}
]
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
AI Score
Confidence
High
SSVC
Exploitation
none
Automatable
no
Technical Impact
total