CVE-2024-45606: Sentry improperly authorizes muting of alert rules
7.1
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.2844%
CWE
Published
9/17/2024
Updated
10/25/2024
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| sentry | pip | >= 23.4.0, < 24.9.0 | 24.9.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from improper authorization checks when fetching alert rules. The pre-patch code in BaseRuleSnoozeEndpoint used self.rule_model.objects.get(id=rule_id) which didn't validate the user's access to the project/organization associated with the rule. The patch added project-scoped queries (fetch_for_project and project filtering) and moved authorization checks to convert_args. The test changes showing 404 responses for unauthorized access confirm the authorization bypass was in rule retrieval. CWE-639 (User-Controlled Key authorization bypass) aligns with this pattern of missing access control on direct object references.