Miggo Logo

CVE-2024-35196: Slack integration leaks sensitive information in logs

2

CVSS Score
3.1

Basic Information

EPSS Score
0.17192%
Published
6/2/2024
Updated
6/2/2024
KEV Status
No
Technology
TechnologyPython

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
sentrypip>= 24.3.0, < 24.5.024.5.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability description explicitly states that request bodies containing sensitive tokens were logged through events matching sentry.integrations.slack logger name and 'slack.*' events. The linked pull request #70508 titled 'ref: remove logging the slack request body' indicates the fix was removing request body logging from Slack request handling code. The workaround suggests modifying logging configuration for sentry.integrations.slack logger, confirming the logging originated from this component. The most logical location for this logging would be in the base Slack request handler's logging method before the patch.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t S*ntry's Sl**k int**r*tion in*orr**tly r**or*s t** in*omin* r*qu*st *o*y in lo*s. T*is r*qu*st **t* **n *ont*in s*nsitiv* in*orm*tion, in*lu*in* t** [**pr***t** Sl**k v*ri*i**tion tok*n](*ttps://*pi.sl**k.*om/*ut**nti**tion/v*ri*yin*-r*qu*

Reasoning

T** vuln*r**ility **s*ription *xpli*itly st*t*s t**t r*qu*st *o*i*s *ont*inin* s*nsitiv* tok*ns w*r* lo**** t*rou** *v*nts m*t**in* `s*ntry.int**r*tions.sl**k` lo***r n*m* *n* 'sl**k.*' *v*nts. T** link** pull r*qu*st #***** titl** 'r**: r*mov* lo**i