Skip to content

SSRF via Phabricator integration

Moderate
oioki published GHSA-rqxh-fp9p-p98r Feb 8, 2024

Package

pip sentry (pip)

Affected versions

>=9.1.0, <24.1.2

Patched versions

24.1.2

Description

Impact

Sentry’s integration platform provides a way for external services to interact with Sentry. One of such integrations, the Phabricator integration (maintained by Sentry) with version <=24.1.1 contains a constrained SSRF vulnerability.

An attacker could make Sentry send POST HTTP requests to arbitrary URLs (including internal IP addresses) by providing an unsanitized input to the Phabricator integration. However, the body payload is constrained to a specific format. If an attacker has access to a Sentry instance, this allows them to:

  • interact with internal network;
  • scan local/remote ports.

Patches

The issue has been fixed in Sentry self-hosted release 24.1.2, and has already been mitigated on sentry.io on February 8, 2024.

Workarounds

There are no known workarounds.

References

#64882

Severity

Moderate
4.3
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
Low
User interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
None
Availability
None
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

CVE ID

CVE-2024-24829

Weaknesses