CVE-2024-5389

In lunary-ai/lunary version 1.2.13, an insufficient granularity of access control vulnerability allows users to create, update, get, and delete prompt variations for datasets not owned by their organization. This issue arises due to the application not properly validating the ownership of dataset prompts and their variations against the organization or project of the requesting user. As a result, unauthorized modifications to dataset prompts can occur, leading to altered or removed dataset prompts without proper authorization. This vulnerability impacts the integrity and consistency of dataset information, potentially affecting the results of experiments.
References
Link Resource
https://huntr.com/bounties/3ca5309f-5615-4d5b-8043-968af220d7a2 Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:lunary:lunary:1.2.13:*:*:*:*:*:*:*

History

12 Jun 2024, 16:31

Type Values Removed Values Added
CPE cpe:2.3:a:lunary:lunary:1.2.13:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.1
CWE CWE-1220 NVD-CWE-Other
First Time Lunary lunary
Lunary
References () https://huntr.com/bounties/3ca5309f-5615-4d5b-8043-968af220d7a2 - () https://huntr.com/bounties/3ca5309f-5615-4d5b-8043-968af220d7a2 - Exploit, Third Party Advisory

09 Jun 2024, 23:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-09 23:15

Updated : 2024-07-09 19:15


NVD link : CVE-2024-5389

Mitre link : CVE-2024-5389


JSON object : View

Products Affected

lunary

  • lunary