-
-
Notifications
You must be signed in to change notification settings - Fork 1.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Request for Patch: CVE-2022-37601 in Sentry Version 24.8.0 #3494
Comments
Pinging @getsentry/security for visibility. Sadly we don't patch old version, as seen on the documentation. Does this issue only happen on 24.8.0? If it doesn't happen on newer versions, I'd rather close this issue, as most users are recommended to frequently upgrade their Sentry instance, at most in a monthly basis. |
No, hard stop only means you will be at that version for at most 10 minutes, and then you can move up into the next hard stop (or just move into the latest version). During the upgrade, your Sentry instance shouldn't be available since your migration isn't finished yet. I don't think this is needed. |
Description
CVE Details
CVE ID: CVE-2022-37601
Description: This vulnerability involves improper input validation, which could potentially allow an attacker to execute arbitrary code or cause a denial of service. (Prototype pollution vulnerability in function parseQuery in parseQuery.js in webpack loader-utils via the name variable in parseQuery.js.) webpack/loader-utils#212
Impact: Exploiting this vulnerability could lead to unauthorized access to sensitive information or service disruption.
Impact Analysis: https://security.snyk.io/vuln/SNYK-JS-LOADERUTILS-3043105
References
Additional Information
Request
Given the mandatory nature of upgrading to version 24.8.0 before moving to newer versions, I kindly request a patch to address CVE-2022-37601 in this version. This will ensure the security and stability of our systems during the upgrade process.
Your prompt attention to this matter would be greatly appreciated.
Suggested Remediation
Additional Information
I appreciate your attention to this matter and your ongoing efforts to maintain the security of Sentry. If further information is needed to assist with this request, please let me know.
Thank you for your support.
The text was updated successfully, but these errors were encountered: