CVE-2024-45606

7.1 HIGH

📋 TL;DR

This vulnerability allows authenticated Sentry users to mute alert rules from organizations and projects they don't belong to or have permissions for. It affects self-hosted Sentry installations between versions 23.4.0 and 24.8.0. Sentry SaaS users are not affected as the platform has already been patched.

💻 Affected Systems

Products:
  • Sentry (self-hosted)
Versions: 23.4.0 to 24.8.0
Operating Systems: All platforms running Sentry
Default Config Vulnerable: ⚠️ Yes
Notes: Sentry SaaS users are not affected. Only self-hosted installations with the alert rule mute feature enabled are vulnerable. The feature was generally available from 23.6.0, but early access users may have had it from 23.4.0.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with valid credentials could disable critical alerting across multiple organizations, potentially hiding security incidents, system failures, or performance degradation from legitimate administrators.

🟠

Likely Case

Malicious or compromised users within one organization could disrupt monitoring in other organizations they shouldn't have access to, causing alert fatigue or hiding issues from legitimate teams.

🟢

If Mitigated

With proper authorization checks in place, only users with appropriate permissions can mute alerts, maintaining the integrity of monitoring systems.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: NO
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access and knowledge of alert rule IDs. No public exploits have been identified, and the vendor reports no instances of unauthorized muting in the wild.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 24.9.0

Vendor Advisory: https://github.com/getsentry/sentry/security/advisories/GHSA-v345-w9f2-mpm5

Restart Required: Yes

Instructions:

1. Backup your Sentry installation and database. 2. Upgrade to Sentry version 24.9.0 or higher using your deployment method (Docker, Kubernetes, etc.). 3. Restart all Sentry services. 4. Verify the upgrade was successful by checking the version in the UI or via API.

🧯 If You Can't Patch

  • Restrict access to Sentry's API endpoints for muting alerts using network controls or WAF rules.
  • Implement additional monitoring for alert mute actions and review audit logs regularly for unauthorized changes.

🔍 How to Verify

Check if Vulnerable:

Check your Sentry version via the web UI (Admin > System Status) or API. If version is between 23.4.0 and 24.8.0 inclusive, you are vulnerable.

Check Version:

curl -s http://your-sentry-host/api/0/ | grep -o '"version":"[^"]*"'

Verify Fix Applied:

After upgrading to 24.9.0 or higher, attempt to mute an alert rule from an organization you don't belong to - this should fail with proper authorization error.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to mute alert rules
  • Alert mute actions from users not in the organization
  • Failed authorization checks for alert operations

Network Indicators:

  • POST requests to /api/0/projects/{organization_slug}/{project_slug}/rules/{rule_id}/mute/ from unauthorized sources

SIEM Query:

source="sentry" AND (event="rule.mute" OR url_path="/api/0/projects/*/rules/*/mute/") AND NOT user.organization IN allowed_organizations

🔗 References

📤 Share & Export