PyPi: Sentry

CVE-2022-23485

Safety vulnerability ID: 52383

This vulnerability was reviewed by experts

The information on this page was manually curated by our Cybersecurity Intelligence Team.

Created at Dec 10, 2022 Updated at Nov 07, 2023
Scan your Python projects for vulnerabilities →

Advisory

Sentry 22.11.0 includes a fix for CVE-2022-23485: In versions of the sentry python library prior to 22.11.0 an attacker with a known valid invite link could manipulate a cookie to allow the same invite link to be reused on multiple accounts when joining an organization. As a result an attacker with a valid invite link can create multiple users and join an organization they may not have been originally invited to. Sentry SaaS customers do not need to take action. Self-hosted Sentry installs on systems which can not upgrade can disable the invite functionality until they are ready to deploy the patched version by editing their 'sentry.conf.py' file (usually located at '~/.sentry/').
https://github.com/getsentry/sentry/security/advisories/GHSA-jv85-mqxj-3f9j

Affected package

sentry

Latest version: 23.7.1

A realtime logging and aggregation server.

Affected versions

Fixed versions

Vulnerability changelog

Sentry is an error tracking and performance monitoring platform. In versions of the sentry python library prior to 22.11.0 an attacker with a known valid invite link could manipulate a cookie to allow the same invite link to be reused on multiple accounts when joining an organization. As a result an attacker with a valid invite link can create multiple users and join an organization they may not have been originally invited to. This issue was patched in version 22.11.0. Sentry SaaS customers do not need to take action. Self-hosted Sentry installs on systems which can not upgrade can disable the invite functionality until they are ready to deploy the patched version by editing their `sentry.conf.py` file (usually located at `~/.sentry/`). See CVE-2022-23485.


MISC:https://github.com/getsentry/sentry/security/advisories/GHSA-jv85-mqxj-3f9j: https://github.com/getsentry/sentry/security/advisories/GHSA-jv85-mqxj-3f9j

Resources

Use this package?

Scan your Python project for dependency vulnerabilities in two minutes

Scan your application

Severity Details

CVSS Base Score

LOW 3.7

CVSS v3 Details

LOW 3.7
Attack Vector (AV)
NETWORK
Attack Complexity (AC)
HIGH
Privileges Required (PR)
NONE
User Interaction (UI)
NONE
Scope (S)
UNCHANGED
Confidentiality Impact (C)
NONE
Integrity Impact (I)
LOW
Availability Availability (A)
NONE