CVE-2022-23485: Sentry vulnerable to invite code reuse via cookie manipulation
6.4
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.16269%
CWE
Published
12/12/2022
Updated
10/22/2024
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:L
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| sentry | pip | >= 20.6.0, < 22.11.0 | 22.11.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stemmed from storing invite code details (memberId and token) in a client-side cookie ('pending-invite') via add_invite_cookie. Since cookies are client-controlled, attackers could modify these values to reuse valid invites. The commit patched this by moving storage to server-side sessions (add_invite_details_to_session) and removing all cookie-based functions. The vulnerable functions directly handled the insecure cookie storage mechanism that enabled the exploit.