Description
Sentry is an error tracking and performance monitoring platform. Prior to 24.4.1, when authenticating as a superuser to Sentry with a username and password, the password is leaked as cleartext in logs under the _event_: `auth-index.validate_superuser`. An attacker with access to the log data could use these leaked credentials to login to the Sentry system as superuser. Self-hosted users on affected versions should upgrade to 24.4.1 or later. Users can configure the logging level to exclude logs of the `INFO` level and only generate logs for levels at `WARNING` or more.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-1123 | Sentry vulnerable to leaking superuser cleartext password in logs |
Github GHSA |
GHSA-6cjm-4pxw-7xp9 | Sentry vulnerable to leaking superuser cleartext password in logs |
References
History
Mon, 15 Sep 2025 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Sentry
Sentry sentry |
|
| CPEs | cpe:2.3:a:sentry:sentry:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Sentry
Sentry sentry |
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-08-02T02:13:39.118Z
Reserved: 2024-04-12T19:41:51.167Z
Link: CVE-2024-32474
Updated: 2024-08-02T02:13:39.118Z
Status : Analyzed
Published: 2024-04-18T20:15:17.733
Modified: 2025-09-15T16:53:23.963
Link: CVE-2024-32474
No data.
OpenCVE Enrichment
Updated: 2025-07-12T22:09:53Z
EUVD
Github GHSA