Safety vulnerability ID: 74440
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Affected versions of Sentry are vulnerable to Information Exposure Through Error Messages (CWE-209). When handling invalid responses from third-party integrations, the Search UI component exposes Client ID and Secret credentials in error messages. This occurs when async search components receive invalid third-party responses, triggered through the SelectRequester class. Though exploitation requires specific validation failures and additional API tokens for full access, it risks exposing integration secrets. Fixed in version 24.11.1 by restructuring error handling and implementing proper error message sanitization.
Latest version: 23.7.1
A realtime logging and aggregation server.
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application