{"description":"Trending threats, MITRE ATT\u0026CK coverage, and detection metadata. Fed continuously.","feed_url":"https://feed.craftedsignal.io/products/sentry-8.2.0/feed.json","home_page_url":"https://feed.craftedsignal.io/","items":[{"_cs_actors":[],"_cs_cpes":[],"_cs_cves":[{"cvss":8.8,"id":"CVE-2021-47935"}],"_cs_exploited":false,"_cs_has_poc":false,"_cs_poc_references":[],"_cs_products":["Sentry 8.2.0"],"_cs_severities":["high"],"_cs_tags":["rce","pickle","deserialization","sentry"],"_cs_type":"advisory","_cs_vendors":["Sentry"],"content_html":"\u003cp\u003eSentry 8.2.0 is vulnerable to remote code execution (CVE-2021-47935) due to insecure deserialization of pickle objects. This vulnerability allows authenticated superusers to execute arbitrary commands on the Sentry server. An attacker with superuser privileges can inject malicious pickle-serialized objects through the audit log entry \u003ccode\u003edata\u003c/code\u003e parameter. The vulnerability arises because the application fails to properly sanitize or validate the data being deserialized, allowing an attacker to inject arbitrary Python code within a base64-encoded compressed pickle payload. Exploitation requires authentication as a superuser, limiting the scope to compromised or malicious administrators.\u003c/p\u003e\n\u003ch2 id=\"attack-chain\"\u003eAttack Chain\u003c/h2\u003e\n\u003col\u003e\n\u003cli\u003eAn attacker authenticates to the Sentry application as a superuser.\u003c/li\u003e\n\u003cli\u003eThe attacker crafts a malicious pickle payload containing arbitrary Python code for execution.\u003c/li\u003e\n\u003cli\u003eThe pickle payload is compressed and then base64 encoded.\u003c/li\u003e\n\u003cli\u003eThe attacker crafts a POST request to the \u003ccode\u003e/admin/auditlog/\u003c/code\u003e endpoint.\u003c/li\u003e\n\u003cli\u003eThe POST request includes the base64-encoded compressed pickle payload within the \u003ccode\u003edata\u003c/code\u003e parameter of the audit log entry.\u003c/li\u003e\n\u003cli\u003eThe Sentry application receives the POST request and attempts to deserialize the pickle data without proper sanitization.\u003c/li\u003e\n\u003cli\u003eThe malicious pickle payload is deserialized, leading to arbitrary code execution with the privileges of the Sentry application.\u003c/li\u003e\n\u003cli\u003eThe attacker achieves remote code execution on the Sentry server.\u003c/li\u003e\n\u003c/ol\u003e\n\u003ch2 id=\"impact\"\u003eImpact\u003c/h2\u003e\n\u003cp\u003eSuccessful exploitation allows an attacker to execute arbitrary commands on the Sentry server with the privileges of the application. This can lead to complete compromise of the Sentry instance, including access to sensitive data, modification of configurations, and potential lateral movement to other systems within the network. Given the critical role Sentry often plays in application monitoring and incident response, a successful attack could severely impact an organization\u0026rsquo;s security posture.\u003c/p\u003e\n\u003ch2 id=\"recommendation\"\u003eRecommendation\u003c/h2\u003e\n\u003cul\u003e\n\u003cli\u003eUpgrade Sentry to a patched version that addresses CVE-2021-47935.\u003c/li\u003e\n\u003cli\u003eDeploy the Sigma rule \u003ccode\u003eDetect Suspicious Sentry Pickle Deserialization in Audit Log\u003c/code\u003e to monitor for exploitation attempts targeting the \u003ccode\u003e/admin/auditlog/\u003c/code\u003e endpoint.\u003c/li\u003e\n\u003cli\u003eRestrict and closely monitor superuser access within the Sentry application to minimize the attack surface.\u003c/li\u003e\n\u003cli\u003eImplement input validation and sanitization measures to prevent the deserialization of untrusted data, mitigating similar vulnerabilities in the future.\u003c/li\u003e\n\u003c/ul\u003e\n","date_modified":"2026-05-10T13:20:09Z","date_published":"2026-05-10T13:20:09Z","id":"https://feed.craftedsignal.io/briefs/2026-05-sentry-rce/","summary":"Sentry 8.2.0 contains a remote code execution vulnerability (CVE-2021-47935) that allows authenticated superusers to execute arbitrary commands by injecting malicious pickle-serialized objects through the audit log entry data parameter via crafted POST requests to the admin audit log endpoint.","title":"Sentry 8.2.0 Remote Code Execution via Pickle Deserialization (CVE-2021-47935)","url":"https://feed.craftedsignal.io/briefs/2026-05-sentry-rce/"}],"language":"en","title":"CraftedSignal Threat Feed — Sentry 8.2.0","version":"https://jsonfeed.org/version/1.1"}