CVE-2023-36829
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
06/07/2023
Last modified:
17/07/2023
Description
Sentry is an error tracking and performance monitoring platform. Starting in version 23.6.0 and prior to version 23.6.2, the Sentry API incorrectly returns the `access-control-allow-credentials: true` HTTP header if the `Origin` request header ends with the `system.base-hostname` option of Sentry installation. This only affects installations that have `system.base-hostname` option explicitly set, as it is empty by default. Impact is limited since recent versions of major browsers have cross-site cookie blocking enabled by default. However, this flaw could allow other multi-step attacks. The patch has been released in Sentry 23.6.2.
Impact
Base Score 3.x
5.40
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:functional:sentry:*:*:*:*:*:*:*:* | 23.6.0 (including) | 23.6.2 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



