
Cloud Vulnerability DB
A community-led vulnerabilities database
Sentry, an error tracking and performance monitoring platform, disclosed a vulnerability (CVE-2023-39349) affecting versions 22.1.0 through 23.7.2. The vulnerability was discovered where an attacker with access to a token with minimal or no scopes could query /api/0/api-tokens/ to obtain a list of all tokens created by a user, including those with greater privileges (Sentry Advisory, NVD).
The vulnerability stems from an authentication bypass issue in the ApiTokensEndpoint, where the system failed to properly validate token scopes when accessing the token listing endpoint. The vulnerability has been assigned a CVSS v3.1 base score of 8.1 (HIGH) with the vector string CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N, indicating a network-exploitable vulnerability with low attack complexity (NVD).
The vulnerability allows attackers to escalate their privileges by obtaining access to tokens with greater scopes than their initial access level. This could potentially lead to unauthorized access to sensitive information and functionality within the Sentry platform. While there is no evidence of exploitation on sentry.io, the impact could be significant for affected installations (Sentry Advisory).
The vulnerability has been patched in Sentry version 23.7.2. Self-hosted users are advised to upgrade to this version and rotate their user authentication tokens. For self-hosted installations, token rotation can be performed via the path /settings/account/api/auth-tokens/. There are no known workarounds for this vulnerability (Sentry Advisory, Release Notes).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."