Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-2258 | Sentry is an error tracking and performance monitoring platform. Starting in version 22.1.0 and prior to version 23.7.2, an attacker with access to a token with few or no scopes can query `/api/0/api-tokens/` for a list of all tokens created by a user, including tokens with greater scopes, and use those tokens in other requests. There is no evidence that the issue was exploited on `sentry.io`. For self-hosted users, it is advised to rotate user auth tokens. A fix is available in version 23.7.2 of `sentry` and `self-hosted`. There are no known workarounds. |
Github GHSA |
GHSA-9jcq-jf57-c62c | Privilege escalation via ApiTokensEndpoint |
Mon, 07 Oct 2024 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Getsentry
Getsentry sentry |
|
| CPEs | cpe:2.3:a:getsentry:sentry:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Getsentry
Getsentry sentry |
|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-10-04T19:12:12.595Z
Reserved: 2023-07-28T13:26:46.477Z
Link: CVE-2023-39349
Updated: 2024-08-02T18:02:06.994Z
Status : Modified
Published: 2023-08-07T19:15:11.697
Modified: 2024-11-21T08:15:12.627
Link: CVE-2023-39349
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA