// For flags

CVE-2024-1902

Session Reuse Vulnerability in lunary-ai/lunary

Severity Score

7.5
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Attend
*SSVC
Descriptions

lunary-ai/lunary is vulnerable to a session reuse attack, allowing a removed user to change the organization name without proper authorization. The vulnerability stems from the lack of validation to check if a user is still part of an organization before allowing them to make changes. An attacker can exploit this by using an old authorization token to send a PATCH request, modifying the organization's name even after being removed from the organization. This issue is due to incorrect synchronization and affects the orgs.patch route.

lunary-ai/lunary es vulnerable a un ataque de reutilización de sesión, lo que permite que un usuario eliminado cambie el nombre de la organización sin la autorización adecuada. La vulnerabilidad surge de la falta de validación para verificar si un usuario todavía es parte de una organización antes de permitirle realizar cambios. Un atacante puede aprovechar esto utilizando un token de autorización antiguo para enviar una solicitud PATCH, modificando el nombre de la organización incluso después de haber sido eliminada de ella. Este problema se debe a una sincronización incorrecta y afecta la ruta orgs.patch.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
High
Availability
None
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:Attend
Exploitation
Poc
Automatable
Yes
Tech. Impact
Partial
* Organization's Worst-case Scenario
Timeline
  • 2024-02-26 CVE Reserved
  • 2024-04-10 CVE Published
  • 2024-08-01 CVE Updated
  • 2025-01-11 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-821: Incorrect Synchronization
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Lunary-ai
Search vendor "Lunary-ai"
Lunary
Search vendor "Lunary-ai" for product "Lunary"
*-
Affected