23.7.1
13 years ago
2 years ago
Known vulnerabilities in the sentry package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for freeVulnerability | Vulnerable Version |
---|---|
Affected versions of this package are vulnerable to Authentication Bypass Using an Alternate Path or Channel due to a race condition in Note: This vulnerability has been fixed in self-hosted Sentry version 25.5.0. How to fix Authentication Bypass Using an Alternate Path or Channel? A fix was pushed into the | [0,) |
Affected versions of this package are vulnerable to Server-Side Request Forgery (SSRF) via Phabricator integration, which does not properly sanitize input. An attacker could exploit this by making the application send POST HTTP requests to arbitrary URLs, including internal IP addresses. This could allow the attacker to interact with the internal network or scan local/remote ports. Note: This is only exploitable if an attacker has access to a Sentry instance. How to fix Server-Side Request Forgery (SSRF)? A fix was pushed into the | [9.1.0,) |
Affected versions of this package are vulnerable to Improper Authentication. An attacker with sufficient client-side exploits could retrieve a valid access token for another user during the OAuth token exchange due to incorrect credential validation. The client ID must be known and the API application must have already been authorized on the targeted user account. How to fix Improper Authentication? A fix was pushed into the | [0,) |