Lucene search

K
prionPRIOn knowledge basePRION:CVE-2023-39349
HistoryAug 07, 2023 - 7:15 p.m.

Code injection

2023-08-0719:15:00
PRIOn knowledge base
www.prio-n.com
5
sentry
error tracking
performance monitoring
version 22.1.0
version 23.7.2
attacker
access
token
scopes
query
api
tokens
exploitation
self-hosted
user
auth
fix

8 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

25.3%

Sentry is an error tracking and performance monitoring platform. Starting in version 22.1.0 and prior to version 23.7.2, an attacker with access to a token with few or no scopes can query /api/0/api-tokens/ for a list of all tokens created by a user, including tokens with greater scopes, and use those tokens in other requests. There is no evidence that the issue was exploited on sentry.io. For self-hosted users, it is advised to rotate user auth tokens. A fix is available in version 23.7.2 of sentry and self-hosted. There are no known workarounds.

CPENameOperatorVersion
sentryge22.1.0
sentrylt23.7.2

8 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

25.3%

Related for PRION:CVE-2023-39349