Safety vulnerability ID: 71984
The information on this page was manually curated by our Cybersecurity Intelligence Team.
The Sentry API incorrectly returns the access-control-allow-credentials: true HTTP header if the Origin request header ends with the system.base-hostname option of Sentry installation. This only affects installations that have system.base-hostname option explicitly set, as it is empty by default. The impact is limited since recent versions of major browsers have cross-site cookie blocking enabled by default. However, this flaw could allow other multi-step attacks.
Latest version: 23.7.1
A realtime logging and aggregation server.
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application