
Cloud Vulnerability DB
A community-led vulnerabilities database
Sentry, an error tracking and performance monitoring platform, disclosed a vulnerability in version 24.11.0 (and only this version) where a specific error message could expose plaintext Client ID and Client Secret for an application integration. The vulnerability (CVE-2024-53253) was discovered during routine testing and disclosed on November 22, 2024. The issue affects the error handling mechanism in the Sentry platform (GitHub Advisory).
The vulnerability occurs under specific conditions: when an app installation uses a Search UI component with the async flag set to true (default setting), a user types into the Search Component triggering a third-party request, and that request fails validation. In such cases, Sentry would return a 'select-requester.invalid-response' error code along with a serialized version of a Sentry application containing the integration Client Secret. While the sensitive information would not be displayed in the UI, it would be present in the underlying HTTP response (GitHub Advisory). The vulnerability has been assigned a CVSS v3.1 base score of 5.3 (Medium) with vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N (NVD).
The exposure of Client ID and Secret pairs could potentially lead to unauthorized access, though exploitation would require an attacker to also obtain a valid API token for a Sentry application. For Sentry SaaS users, only a single application integration was impacted. For self-hosted users who maintain their own integrations, any integration using the Search UI component could be affected (GitHub Advisory).
For Sentry SaaS users, no action is required as the affected integration owner has already rotated their Client Secret. Self-hosted users should upgrade to version 24.11.1 or higher. Self-hosted users running version 24.11.0 should search for 'select-requester.invalid-response' events and review the parameters logged for each event. As a temporary workaround, self-hosted users may consider downgrading to version 24.10.0 (GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."