Safety vulnerability ID: 71926
The information on this page was manually curated by our Cybersecurity Intelligence Team.
When authenticating as a superuser to a self-hosted Sentry instance with a username and password, the password is leaked as cleartext in logs under the event: auth-index.validate_superuser. An attacker with access to the log data could use these leaked credentials to log in to the Sentry system as a superuser.
Latest version: 23.7.1
A realtime logging and aggregation server.
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application