Description

Sentry is a developer-first error tracking and performance monitoring platform. An authenticated user delete the user issue alert notifications for arbitrary users given a know alert ID. A patch was issued to ensure authorization checks are properly scoped on requests to delete user alert notifications. Sentry SaaS users do not need to take any action. Self-Hosted Sentry users should upgrade to version 24.9.0 or higher. There are no known workarounds for this vulnerability.

INFO

Published Date :

2024-09-17T19:44:50.664Z

Last Modified :

2024-09-18T13:19:27.312Z

Source :

GitHub_M
AFFECTED PRODUCTS

The following products are affected by CVE-2024-45605 vulnerability.

Vendors Products
Sentry
  • Sentry
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2024-45605.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact