Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-0239 | Sentry is an error tracking and performance monitoring platform. Starting in version 23.6.0 and prior to version 23.6.2, the Sentry API incorrectly returns the `access-control-allow-credentials: true` HTTP header if the `Origin` request header ends with the `system.base-hostname` option of Sentry installation. This only affects installations that have `system.base-hostname` option explicitly set, as it is empty by default. Impact is limited since recent versions of major browsers have cross-site cookie blocking enabled by default. However, this flaw could allow other multi-step attacks. The patch has been released in Sentry 23.6.2. |
Github GHSA |
GHSA-4xqm-4p72-87h6 | Sentry CORS misconfiguration |
Wed, 06 Nov 2024 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Sentry
Sentry sentry |
|
| CPEs | cpe:2.3:a:sentry:sentry:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Sentry
Sentry sentry |
|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-11-06T16:44:37.019Z
Reserved: 2023-06-27T15:43:18.388Z
Link: CVE-2023-36829
Updated: 2024-08-02T17:01:09.196Z
Status : Modified
Published: 2023-07-06T23:15:09.620
Modified: 2024-11-21T08:10:41.450
Link: CVE-2023-36829
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA