lunary-ai/lunary is vulnerable to a session reuse attack, allowing a removed user to change the organization name without proper authorization. The vulnerability stems from the lack of validation to check if a user is still part of an organization before allowing them to make changes. An attacker can exploit this by using an old authorization token to send a PATCH request, modifying the organization's name even after being removed from the organization. This issue is due to incorrect synchronization and affects the orgs.patch route.
History

Fri, 10 Jan 2025 14:45:00 +0000

Type Values Removed Values Added
First Time appeared Lunary
Lunary lunary
Weaknesses NVD-CWE-Other
CPEs cpe:2.3:a:lunary:lunary:*:*:*:*:*:*:*:*
Vendors & Products Lunary
Lunary lunary
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: @huntr_ai

Published:

Updated: 2024-08-01T18:56:22.480Z

Reserved: 2024-02-26T19:31:07.972Z

Link: CVE-2024-1902

cve-icon Vulnrichment

Updated: 2024-08-01T18:56:22.480Z

cve-icon NVD

Status : Analyzed

Published: 2024-04-10T17:15:53.680

Modified: 2025-01-10T14:29:55.370

Link: CVE-2024-1902

cve-icon Redhat

No data.