Resource Exhaustion Affecting @sentry/astro package, versions >=7.78.0 <7.87.0


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.09% (41st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-JS-SENTRYASTRO-6131644
  • published19 Dec 2023
  • disclosed18 Dec 2023
  • creditUnknown

Introduced: 18 Dec 2023

CVE-2023-50249  (opens in a new tab)
CWE-400  (opens in a new tab)

How to fix?

Upgrade @sentry/astro to version 7.87.0 or higher.

Overview

@sentry/astro is an Official Sentry SDK for Astro

Affected versions of this package are vulnerable to Resource Exhaustion due to unescaped parameter values in RegExp. An attacker can cause excessive computation times on the server.

Workaround

1)Disable auto instrumentation if you're using Astro 3.5.0 or newer.

2)Remove the manually added Sentry middleware

Note:

After these changes, Sentry error reporting will still be functional, but some details such as server-side transactions and consequently, distributed traces between client and server, will be omitted. Therefore is recommended to update to 7.87.0 as soon as possible.

CVSS Scores

version 3.1