Privilege escalation via ApiTokensEndpoint
Description
Published by the National Vulnerability Database
Aug 7, 2023
Published to the GitHub Advisory Database
Aug 8, 2023
Reviewed
Aug 8, 2023
Last updated
Nov 10, 2023
Impact
An attacker with access to a token with few or no scopes can query
/api/0/api-tokens/
for a list of all tokens created by a user, including tokens with greater scopes, and use those tokens in other requests.There is no evidence that the issue was exploited on https://sentry.io. For self-hosted users, it is advised to rotate user auth tokens via
https://your-self-hosted-sentry-installation/settings/account/api/auth-tokens/
.Patches
The issue was fixed in getsentry/sentry#53850 and is available in the release 23.7.2 of sentry and self-hosted.
Workarounds
There are no known workarounds.
References