Information Exposure Affecting sentry-sdk package, versions [,2.8.0)
Threat Intelligence
EPSS
0.04% (12th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-PYTHON-SENTRYSDK-7541801
- published 19 Jul 2024
- disclosed 18 Jul 2024
- credit Kevin Michel
Introduced: 18 Jul 2024
CVE-2024-40647 Open this link in a new tabHow to fix?
Upgrade sentry-sdk
to version 2.8.0 or higher.
Overview
Affected versions of this package are vulnerable to Information Exposure due to all environment variables being passed to the subprocesses when env={}
is set. This vulnerability could lead to unintentional exposure of environment variables to subprocesses despite the env={}
setting, unless the Sentry SDK's Stdlib integration is disabled.
Note:
The Stdlib integration is enabled by default.
Workaround
Replace
env={}
with the minimal dictenv={"EMPTY_ENV":"1"}
or similar.Disable
Stdlib
integration.