CVE-2024-8765

In lunary-ai/lunary, the privilege check mechanism is flawed in version git afc5df4. The system incorrectly identifies certain endpoints as public if the path contains '/auth/' anywhere within it. This allows unauthenticated attackers to access sensitive endpoints by including '/auth/' in the path. As a result, attackers can obtain and modify sensitive data and utilize other organizations' resources without proper authentication.
CVSS

No CVSS.

Configurations

Configuration 1 (hide)

cpe:2.3:a:lunary:lunary:*:*:*:*:*:*:*:*

History

02 Jul 2025, 19:51

Type Values Removed Values Added
References () https://huntr.com/bounties/4908cfcf-607a-412a-9635-966cbb08bb49 - () https://huntr.com/bounties/4908cfcf-607a-412a-9635-966cbb08bb49 - Exploit, Third Party Advisory
References () https://github.com/lunary-ai/lunary/commit/7ff89b0304d191534b924cf063f3648206d497fa - () https://github.com/lunary-ai/lunary/commit/7ff89b0304d191534b924cf063f3648206d497fa - Patch
First Time Lunary
Lunary lunary
CPE cpe:2.3:a:lunary:lunary:*:*:*:*:*:*:*:*

20 Mar 2025, 10:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-03-20 10:15

Updated : 2025-07-02 19:51


NVD link : CVE-2024-8765

Mitre link : CVE-2024-8765


JSON object : View

Products Affected

lunary

  • lunary
CWE
CWE-41

Improper Resolution of Path Equivalence