In lunary-ai/lunary before version 1.6.3, the application allows the creation of evaluators without enforcing a unique constraint on the combination of projectId and slug. This allows an attacker to overwrite existing data by submitting a POST request with the same slug as an existing evaluator. The lack of database constraints or application-layer validation to prevent duplicates exposes the application to data integrity issues. This vulnerability can result in corrupted data and potentially malicious actions, impairing the system's functionality.
CVSS
No CVSS.
References
Link | Resource |
---|---|
https://github.com/lunary-ai/lunary/commit/79dc370596d979b756f6ea0250d97a2d02385ecd | Patch |
https://huntr.com/bounties/3d99aca5-b135-4833-b48b-7806bc4bf861 | Exploit Third Party Advisory |
Configurations
History
02 Jul 2025, 19:48
Type | Values Removed | Values Added |
---|---|---|
First Time |
Lunary
Lunary lunary |
|
References | () https://huntr.com/bounties/3d99aca5-b135-4833-b48b-7806bc4bf861 - Exploit, Third Party Advisory | |
References | () https://github.com/lunary-ai/lunary/commit/79dc370596d979b756f6ea0250d97a2d02385ecd - Patch | |
CPE | cpe:2.3:a:lunary:lunary:*:*:*:*:*:*:*:* |
20 Mar 2025, 10:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-03-20 10:15
Updated : 2025-07-02 19:48
NVD link : CVE-2024-11301
Mitre link : CVE-2024-11301
JSON object : View
Products Affected
lunary
- lunary
CWE
CWE-837
Improper Enforcement of a Single, Unique Action