PyPi: Sentry

CVE-2024-53253

Safety vulnerability ID: 74440

This vulnerability was reviewed by experts

The information on this page was manually curated by our Cybersecurity Intelligence Team.

Created at Nov 22, 2024 Updated at Dec 08, 2024
Scan your Python projects for vulnerabilities →

Advisory

Affected versions of Sentry are vulnerable to Information Exposure Through Error Messages (CWE-209). When handling invalid responses from third-party integrations, the Search UI component exposes Client ID and Secret credentials in error messages. This occurs when async search components receive invalid third-party responses, triggered through the SelectRequester class. Though exploitation requires specific validation failures and additional API tokens for full access, it risks exposing integration secrets. Fixed in version 24.11.1 by restructuring error handling and implementing proper error message sanitization.

Affected package

sentry

Latest version: 23.7.1

A realtime logging and aggregation server.

Affected versions

Fixed versions

Vulnerability changelog

This vulnerability has no description

Resources

Use this package?

Scan your Python project for dependency vulnerabilities in two minutes

Scan your application