Description
Sentry 8.2.0 contains a remote code execution vulnerability that allows authenticated superusers to execute arbitrary commands by injecting malicious pickle-serialized objects through the audit log entry data parameter. Attackers can submit crafted POST requests to the admin audit log endpoint with base64-encoded compressed pickle payloads in the data field to achieve code execution with application privileges.
Problem types
Improper Control of Generation of Code ('Code Injection')
Product status
Credits
Mohin Paramasivam (Shad0wQu35t)
References
www.exploit-db.com/exploits/50318 (ExploitDB-50318)
sentry.io/welcome/ (Product Reference)
www.vulncheck.com/...de-execution-via-pickle-deserialization (VulnCheck Advisory: Sentry 8.2.0 Remote Code Execution via Pickle Deserialization)