Advisory Database
  • Advisories
  • Dependency Scanning
  1. pypi
  2. ›
  3. sentry
  4. ›
  5. CVE-2024-53253

CVE-2024-53253: Sentry improper error handling leaks Application Integration Client Secret

November 22, 2024 (updated December 3, 2024)

During routine testing, we identified a scenario where a specific error message generated by our platform could include a plaintext Client ID and Client Secret for an application integration. The Client ID and Client Secret would not be displayed in the UI, but would be returned in the underlying HTTP response to the end user. This could occur under the following conditions:

  • An app installation made use of a Search UI component with the async flag set to true (default: true),
  • A user types types into the Search Component which creates a request to the third-party for search or query results, and
  • That third-party response may then fail validation and Sentry would return the select-requester.invalid-response error code along with a serialized version of a Sentry application containing the integration Client Secret.

Should this error be found, it’s reasonable to assume the potential exposure of an integration Client Secret. However, an ID and Secret pair alone does not provide direct access to any data. For that secret to be abused an attacker would also need to obtain a valid API token for a Sentry application.

References

  • github.com/advisories/GHSA-v5h2-q2w4-gpcx
  • github.com/getsentry/sentry
  • github.com/getsentry/sentry/pull/79377
  • github.com/getsentry/sentry/pull/81038
  • github.com/getsentry/sentry/security/advisories/GHSA-v5h2-q2w4-gpcx
  • nvd.nist.gov/vuln/detail/CVE-2024-53253

Code Behaviors & Features

Detect and mitigate CVE-2024-53253 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 24.11.0 before 24.11.1, version 24.11.0

Fixed versions

  • 24.11.1

Solution

Upgrade to version 24.11.1 or above.

Impact 5.3 MEDIUM

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Learn more about CVSS

Weakness

  • CWE-209: Generation of Error Message Containing Sensitive Information

Source file

pypi/sentry/CVE-2024-53253.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:16:03 +0000.