Symbolicator is a symbolication service for native stacktraces and minidumps with symbol server support. An attacker could make Symbolicator send arbitrary GET HTTP requests to internal IP addresses by using a specially crafted HTTP endpoint. The response could be reflected to the attacker if they have an account on Sentry instance. The issue has been fixed in the release 23.11.2.
References
| Link | Resource |
|---|---|
| https://github.com/getsentry/symbolicator/commit/9db2fb9197dd200d62aacebd8efef4df7678865a | Patch Vendor Advisory |
| https://github.com/getsentry/symbolicator/pull/1332 | Vendor Advisory |
| https://github.com/getsentry/symbolicator/releases/tag/23.11.2 | Release Notes Vendor Advisory |
| https://github.com/getsentry/symbolicator/security/advisories/GHSA-6576-pr6j-h9c6 | Mitigation Vendor Advisory |
Configurations
History
No history.
Information
Published : 2023-11-30 05:15
Updated : 2023-12-12 14:55
NVD link : CVE-2023-49094
Mitre link : CVE-2023-49094
CVE.ORG link : CVE-2023-49094
JSON object : View
Products Affected
sentry
- symbolicator
CWE
CWE-918
Server-Side Request Forgery (SSRF)
