CVE-2023-36829

MEDIUM

Sentry <23.6.2 - Open Redirect

Title source: llm
STIX 2.1

Description

Sentry is an error tracking and performance monitoring platform. Starting in version 23.6.0 and prior to version 23.6.2, the Sentry API incorrectly returns the `access-control-allow-credentials: true` HTTP header if the `Origin` request header ends with the `system.base-hostname` option of Sentry installation. This only affects installations that have `system.base-hostname` option explicitly set, as it is empty by default. Impact is limited since recent versions of major browsers have cross-site cookie blocking enabled by default. However, this flaw could allow other multi-step attacks. The patch has been released in Sentry 23.6.2.

Scores

CVSS v3 6.8
EPSS 0.0019
EPSS Percentile 40.3%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact total

Details

CWE
CWE-942 CWE-697 CWE-863
Status published
Products (2)
functional/sentry 23.6.0 - 23.6.2
pypi/sentry 23.6.0 - 23.6.2PyPI
Published Jul 06, 2023
Tracked Since Feb 18, 2026