Bug ID 1206304
Summary VUL-0: CVE-2022-23485: python-sentry-sdk: Invite code reuse via cookie manipulation
Classification openSUSE
Product openSUSE Distribution
Version Leap 15.4
Hardware Other
URL https://smash.suse.de/issue/350232/
OS Other
Status NEW
Severity Normal
Priority P5 - None
Component Security
Assignee ecsos@schirra.net
Reporter thomas.leroy@suse.com
QA Contact security-team@suse.de
Found By Security Response Team
Blocker ---

CVE-2022-23485

Sentry is an error tracking and performance monitoring platform. In versions of
the sentry python library prior to 22.11.0 an attacker with a known valid
invite
link could manipulate a cookie to allow the same invite link to be reused on
multiple accounts when joining an organization. As a result an attacker with a
valid invite link can create multiple users and join an organization they may
not have been originally invited to. This issue was patched in version 22.11.0.
Sentry SaaS customers do not need to take action. Self-hosted Sentry installs
on
systems which can not upgrade can disable the invite functionality until they
are ready to deploy the patched version by editing their `sentry.conf.py` file
(usually located at `~/.sentry/`).

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-23485
https://www.cve.org/CVERecord?id=CVE-2022-23485
https://github.com/getsentry/sentry/security/advisories/GHSA-jv85-mqxj-3f9j
http://www.cvedetails.com/cve/CVE-2022-23485/


You are receiving this mail because: