CVE-2024-11301

In lunary-ai/lunary before version 1.6.3, the application allows the creation of evaluators without enforcing a unique constraint on the combination of projectId and slug. This allows an attacker to overwrite existing data by submitting a POST request with the same slug as an existing evaluator. The lack of database constraints or application-layer validation to prevent duplicates exposes the application to data integrity issues. This vulnerability can result in corrupted data and potentially malicious actions, impairing the system's functionality.
CVSS

No CVSS.

Configurations

Configuration 1 (hide)

cpe:2.3:a:lunary:lunary:*:*:*:*:*:*:*:*

History

02 Jul 2025, 19:48

Type Values Removed Values Added
First Time Lunary
Lunary lunary
References () https://huntr.com/bounties/3d99aca5-b135-4833-b48b-7806bc4bf861 - () https://huntr.com/bounties/3d99aca5-b135-4833-b48b-7806bc4bf861 - Exploit, Third Party Advisory
References () https://github.com/lunary-ai/lunary/commit/79dc370596d979b756f6ea0250d97a2d02385ecd - () https://github.com/lunary-ai/lunary/commit/79dc370596d979b756f6ea0250d97a2d02385ecd - Patch
CPE cpe:2.3:a:lunary:lunary:*:*:*:*:*:*:*:*

20 Mar 2025, 10:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-03-20 10:15

Updated : 2025-07-02 19:48


NVD link : CVE-2024-11301

Mitre link : CVE-2024-11301


JSON object : View

Products Affected

lunary

  • lunary
CWE
CWE-837

Improper Enforcement of a Single, Unique Action