Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. @sentry/astro
  4. ›
  5. CVE-2023-50249

CVE-2023-50249: Sentry's Astro SDK vulnerable to ReDoS

December 18, 2023

Impact

A ReDoS (Regular expression Denial of Service) vulnerability has been identified in Sentry’s Astro SDK 7.78.0-7.86.0. Under certain conditions, this vulnerability allows an attacker to cause excessive computation times on the server, leading to denial of service (DoS).

Applications that are using Sentry’s Astro SDK are affected if:

  1. They’re using Sentry instrumentation:
  • they have manually registered Sentry Middleware (affected versions 7.78.0-7.86.0);
  • or configured Astro in SSR (server) or hybrid mode, use Astro 3.5.0 and newer and didn’t disable the automatic server instrumentation (affected versions 7.82.0-7.86.0).
  1. They have configured routes with at least two path params (e.g. /foo/[p1]/bar/[p2]).

Patches

The problem has been patched in @sentry/astro@7.87.0. The corresponding PR: https://github.com/getsentry/sentry-javascript/pull/9815

Workarounds

We strongly recommend upgrading to the latest SDK version. However, if it’s not possible, the steps to mitigate the vulnerability without upgrade are:

  • disable auto instrumentation if you’re using Astro 3.5.0 or newer
  • and remove the manually added Sentry middleware (if it was added before).

After these changes, Sentry error reporting will still be functional, but some details such as server-side transactions (and consequently, distributed traces between client and server) will be omitted. We therefore still recommend to update to 7.87.0 as soon as you can.

References

  • Sentry docs: Manual Setup for Astro
  • Release notes: sentry-javascript 7.87.0
  • npm: @sentry/astro@7.87.0

References

  • docs.sentry.io/platforms/javascript/guides/astro/manual-setup/
  • github.com/advisories/GHSA-x3v3-8xg8-8v72
  • github.com/getsentry/sentry-javascript/commit/fe24eb5eefa9d27b14b2b6f9ebd1debca1c208fb
  • github.com/getsentry/sentry-javascript/pull/9815
  • github.com/getsentry/sentry-javascript/security/advisories/GHSA-x3v3-8xg8-8v72
  • www.npmjs.com/package/@sentry/astro/v/7.87.0

Code Behaviors & Features

Detect and mitigate CVE-2023-50249 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 7.78.0 before 7.87.0

Fixed versions

  • 7.87.0

Solution

Upgrade to version 7.87.0 or above.

Source file

npm/@sentry/astro/CVE-2023-50249.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Mon, 12 May 2025 12:15:18 +0000.