Description
Sentry is a developer-first error tracking and performance monitoring platform. An authenticated user delete the user issue alert notifications for arbitrary users given a know alert ID. A patch was issued to ensure authorization checks are properly scoped on requests to delete user alert notifications. Sentry SaaS users do not need to take any action. Self-Hosted Sentry users should upgrade to version 24.9.0 or higher. There are no known workarounds for this vulnerability.
INFO
Published Date :
2024-09-17T19:44:50.664Z
Last Modified :
2024-09-18T13:19:27.312Z
Source :
GitHub_M
AFFECTED PRODUCTS
The following products are affected by CVE-2024-45605 vulnerability.
| Vendors | Products |
|---|---|
| Sentry |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2024-45605.
CVSS Vulnerability Scoring System
Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact