CVE-2024-5130

An Incorrect Authorization vulnerability exists in lunary-ai/lunary versions up to and including 1.2.2, which allows unauthenticated users to delete any dataset. The vulnerability is due to the lack of proper authorization checks in the dataset deletion endpoint. Specifically, the endpoint does not verify if the provided project ID belongs to the current user, thereby allowing any dataset to be deleted without proper authentication. This issue was fixed in version 1.2.8.
Configurations

Configuration 1 (hide)

cpe:2.3:a:lunary:lunary:*:*:*:*:*:*:*:*

History

21 Nov 2024, 09:47

Type Values Removed Values Added
References () https://github.com/lunary-ai/lunary/commit/14078c1d2b8766075bf655f187ece24c7a787776 - Patch () https://github.com/lunary-ai/lunary/commit/14078c1d2b8766075bf655f187ece24c7a787776 - Patch
References () https://huntr.com/bounties/e81a9871-308d-4628-9726-af66643a16fe - Exploit, Issue Tracking, Patch, Third Party Advisory () https://huntr.com/bounties/e81a9871-308d-4628-9726-af66643a16fe - Exploit, Issue Tracking, Patch, Third Party Advisory

03 Nov 2024, 17:15

Type Values Removed Values Added
CWE CWE-863

03 Oct 2024, 16:57

Type Values Removed Values Added
CPE cpe:2.3:a:lunary:lunary:*:*:*:*:*:*:*:*
CWE CWE-639
First Time Lunary
Lunary lunary
References () https://github.com/lunary-ai/lunary/commit/14078c1d2b8766075bf655f187ece24c7a787776 - () https://github.com/lunary-ai/lunary/commit/14078c1d2b8766075bf655f187ece24c7a787776 - Patch
References () https://huntr.com/bounties/e81a9871-308d-4628-9726-af66643a16fe - () https://huntr.com/bounties/e81a9871-308d-4628-9726-af66643a16fe - Exploit, Issue Tracking, Patch, Third Party Advisory

07 Jun 2024, 14:56

Type Values Removed Values Added
Summary
  • (es) Existe una vulnerabilidad de autorización incorrecta en las versiones lunary-ai/lunary hasta la 1.2.2 incluida, que permite a los usuarios no autenticados eliminar cualquier conjunto de datos. La vulnerabilidad se debe a la falta de comprobaciones de autorización adecuadas en el endpoint de eliminación del conjunto de datos. Específicamente, el endpoint no verifica si el ID del proyecto proporcionado pertenece al usuario actual, lo que permite que se elimine cualquier conjunto de datos sin la autenticación adecuada. Este problema se solucionó en la versión 1.2.8.

06 Jun 2024, 19:16

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-06 19:16

Updated : 2024-11-21 09:47


NVD link : CVE-2024-5130

Mitre link : CVE-2024-5130

CVE.ORG link : CVE-2024-5130


JSON object : View

Products Affected

lunary

  • lunary
CWE
CWE-639

Authorization Bypass Through User-Controlled Key