Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[CVE-2024-24829]: SSRF via Phabricator integration #9

Open
jeff-a-holland-codecov opened this issue Feb 9, 2024 · 0 comments
Open

Comments

@jeff-a-holland-codecov
Copy link
Collaborator

jeff-a-holland-codecov commented Feb 9, 2024

Package and Versions

Package: sentry
Affected Version(s): >=9.1.0, <24.1.2
Patched Version(s): 24.1.2

Description / Impact

Sentry’s integration platform provides a way for external services to interact with Sentry. One of such integrations, the Phabricator integration (maintained by Sentry) with version <=24.1.1 contains a constrained SSRF vulnerability.

An attacker could make Sentry send POST HTTP requests to arbitrary URLs (including internal IP addresses) by providing an unsanitized input to the Phabricator integration. However, the body payload is constrained to a specific format. If an attacker has access to a Sentry instance, this allows them to:

  • interact with internal network;
  • scan local/remote ports.

Patches

The issue has been fixed in Sentry self-hosted release 24.1.2, and has already been mitigated on sentry.io on February 8, 2024.

Workarounds

There are no known workarounds.

CVSS 3.1 Score and Vector

CVSS Score: 4.3
CVSS Vector: 3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

References

@mdtro mdtro changed the title [Security Advisory]: SSRF via Phabricator integration [CVE-2024-24829]: SSRF via Phabricator integration Apr 1, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants