lunary-ai/lunary version 1.0.1 is vulnerable to improper authorization, allowing removed members to read, create, modify, and delete prompt templates using an old authorization token. Despite being removed from an organization, these members can still perform operations on prompt templates by sending HTTP requests with their previously captured authorization token. This issue exposes organizations to unauthorized access and manipulation of sensitive template data.
References
| Link | Resource |
|---|---|
| https://github.com/lunary-ai/lunary/commit/d8e2e73efd53ab4e92cf47bbf4b639a9f08853d2 | Patch |
| https://huntr.com/bounties/671bd040-1cc5-4227-8182-5904e9c5ed3b | Exploit Issue Tracking Patch Third Party Advisory |
| https://github.com/lunary-ai/lunary/commit/d8e2e73efd53ab4e92cf47bbf4b639a9f08853d2 | Patch |
| https://huntr.com/bounties/671bd040-1cc5-4227-8182-5904e9c5ed3b | Exploit Issue Tracking Patch Third Party Advisory |
Configurations
History
No history.
Information
Published : 2024-04-10 17:15
Updated : 2025-01-31 11:15
NVD link : CVE-2024-1741
Mitre link : CVE-2024-1741
CVE.ORG link : CVE-2024-1741
JSON object : View
Products Affected
lunary
- lunary
CWE
CWE-863
Incorrect Authorization
