In lunary-ai/lunary version 1.2.13, an insufficient granularity of access control vulnerability allows users to create, update, get, and delete prompt variations for datasets not owned by their organization. This issue arises due to the application not properly validating the ownership of dataset prompts and their variations against the organization or project of the requesting user. As a result, unauthorized modifications to dataset prompts can occur, leading to altered or removed dataset prompts without proper authorization. This vulnerability impacts the integrity and consistency of dataset information, potentially affecting the results of experiments.
References
Link | Resource |
---|---|
https://huntr.com/bounties/3ca5309f-5615-4d5b-8043-968af220d7a2 | Exploit Third Party Advisory |
Configurations
History
12 Jun 2024, 16:31
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.1 |
CWE | NVD-CWE-Other | |
First Time |
Lunary
Lunary lunary |
|
References | () https://huntr.com/bounties/3ca5309f-5615-4d5b-8043-968af220d7a2 - Exploit, Third Party Advisory | |
CPE | cpe:2.3:a:lunary:lunary:1.2.13:*:*:*:*:*:*:* | |
Summary |
|
09 Jun 2024, 23:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-06-09 23:15
Updated : 2024-07-09 19:15
NVD link : CVE-2024-5389
Mitre link : CVE-2024-5389
CVE.ORG link : CVE-2024-5389
JSON object : View
Products Affected
lunary
- lunary
CWE