Remote Code Execution Flaw in Sentry 8.2.0 by Sentry
CVE-2021-47935
Key Information:
Badges
What is CVE-2021-47935?
Sentry 8.2.0 is vulnerable to a remote code execution attack that can be exploited by authenticated superusers. By injecting malicious pickle-serialized objects into the audit log entry data parameter, attackers can send specially crafted POST requests to the admin audit log endpoint. This exploitation allows them to execute arbitrary commands with the privileges of the application. It underscores the importance of securing audit log entries and validating data before processing.
Affected Version(s)
Sentry 8.2.0
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- ๐ก
Public PoC available
- ๐พ
Exploit known to exist
Vulnerability published
Vulnerability Reserved
