Sentry CORS 配置错误漏洞 (CVE-2023-36829)

admin 2023-11-29 22:49:27 Ali_nvd 来源:ZONE.CI 全球网 0 阅读模式
中危 Sentry CORS 配置错误漏洞 (CVE-2023-36829)

CVE编号

CVE-2023-36829

利用情况

暂无

补丁情况

官方补丁

披露时间

2023-07-07
漏洞描述
Sentry is an error tracking and performance monitoring platform. Starting in version 23.6.0 and prior to version 23.6.2, the Sentry API incorrectly returns the `access-control-allow-credentials: true` HTTP header if the `Origin` request header ends with the `system.base-hostname` option of Sentry installation. This only affects installations that have `system.base-hostname` option explicitly set, as it is empty by default. Impact is limited since recent versions of major browsers have cross-site cookie blocking enabled by default. However, this flaw could allow other multi-step attacks. The patch has been released in Sentry 23.6.2.
解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接
https://github.com/getsentry/self-hosted/releases/tag/23.6.2
https://github.com/getsentry/sentry/commit/ee44c6be35e5e464bc40637580f39867898acd8b
https://github.com/getsentry/sentry/pull/52276
https://github.com/getsentry/sentry/security/advisories/GHSA-4xqm-4p72-87h6
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
应用 functional sentry * From (including) 23.6.0 Up to (excluding) 23.6.2
阿里云评分 4.9
  • 攻击路径 本地
  • 攻击复杂度 困难
  • 权限要求 管控权限
  • 影响范围 有限影响
  • EXP成熟度 未验证
  • 补丁情况 官方补丁
  • 数据保密性 无影响
  • 数据完整性 无影响
  • 服务器危害 无影响
  • 全网数量 N/A
CWE-ID 漏洞类型
CWE-697 不充分的比较
CWE-863 授权机制不正确
CWE-942 过度许可的跨域白名单
- avd.aliyun.com
weinxin
版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
N/A Ali_nvd

N/A

N/ACVE编号 CVE-2024-9120利用情况 暂无补丁情况 N/A披露时间 2024-09-23漏洞描述Use after free in Dawn
评论:0   参与:  0