An improper access control vulnerability exists in lunary-ai/lunary at the latest commit (a761d83) on the main branch. The vulnerability allows an attacker to use the auth tokens issued by the 'invite user' functionality to obtain valid JWT tokens. These tokens can be used to compromise target users upon registration for their own arbitrary organizations. The attacker can invite a target email, obtain a one-time use token, retract the invite, and later use the token to reset the password of the target user, leading to full account takeover.
References
Link | Resource |
---|---|
https://github.com/lunary-ai/lunary/commit/844e8855c7a713dc7371766dba4125de4007b1cf | Patch |
https://huntr.com/bounties/bd9f2301-11c7-4cbd-8d77-3e9225bd67e8 | Exploit Third Party Advisory |
Configurations
History
19 Sep 2024, 19:32
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References | () https://github.com/lunary-ai/lunary/commit/844e8855c7a713dc7371766dba4125de4007b1cf - Patch | |
References | () https://huntr.com/bounties/bd9f2301-11c7-4cbd-8d77-3e9225bd67e8 - Exploit, Third Party Advisory | |
First Time |
Lunary lunary
Lunary |
|
CWE | NVD-CWE-Other | |
CPE | cpe:2.3:a:lunary:lunary:*:*:*:*:*:*:*:* |
13 Sep 2024, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-09-13 17:15
Updated : 2024-09-19 19:32
NVD link : CVE-2024-6087
Mitre link : CVE-2024-6087
CVE.ORG link : CVE-2024-6087
JSON object : View
Products Affected
lunary
- lunary
CWE