Lucene search

K
cve[email protected]CVE-2023-46729
HistoryNov 10, 2023 - 1:15 a.m.

CVE-2023-46729

2023-11-1001:15:07
CWE-918
web.nvd.nist.gov
42
sentry-javascript
next.js
sdk
tunnel endpoint
http request
arbitrary urls
security vulnerability
cve-2023-46729
nvd

9.3 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N

0.001 Low

EPSS

Percentile

20.8%

sentry-javascript provides Sentry SDKs for JavaScript. An unsanitized input of Next.js SDK tunnel endpoint allows sending HTTP requests to arbitrary URLs and reflecting the response back to the user. This issue only affects users who have Next.js SDK tunneling feature enabled. The problem has been fixed in version 7.77.0.

Affected configurations

Vulners
NVD
Node
getsentryraven-rubyRange7.26.07.77.0
VendorProductVersionCPE
getsentryraven\-ruby*cpe:2.3:a:getsentry:raven\-ruby:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "getsentry",
    "product": "sentry-javascript",
    "versions": [
      {
        "version": ">= 7.26.0, < 7.77.0",
        "status": "affected"
      }
    ]
  }
]

9.3 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N

0.001 Low

EPSS

Percentile

20.8%

Related for CVE-2023-46729