// For flags

CVE-2024-5248

Improper Access Control in lunary-ai/lunary

Severity Score

6.5
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track
*SSVC
Descriptions

In lunary-ai/lunary version 1.2.5, an improper access control vulnerability exists due to a missing permission check in the `GET /v1/users/me/org` endpoint. The platform's role definitions restrict the `Prompt Editor` role to prompt management and project viewing/listing capabilities, explicitly excluding access to user information. However, the endpoint fails to enforce this restriction, allowing users with the `Prompt Editor` role to access the full list of users in the organization. This vulnerability allows unauthorized access to sensitive user information, violating the intended access controls.

En lunary-ai/lunary versión 1.2.5, existe una vulnerabilidad de control de acceso inadecuado debido a una falta de verificación de permiso en el endpoint `GET /v1/users/me/org`. Las definiciones de funciones de la plataforma restringen la función "Editor de mensajes" a la gestión de mensajes y las capacidades de visualización/enumeración de proyectos, excluyendo explícitamente el acceso a la información del usuario. Sin embargo, el endpoint no aplica esta restricción, lo que permite a los usuarios con la función "Editor de mensajes" acceder a la lista completa de usuarios de la organización. Esta vulnerabilidad permite el acceso no autorizado a información confidencial del usuario, violando los controles de acceso previstos.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
Attack Vector
Network
Attack Complexity
Low
Authentication
Single
Confidentiality
Complete
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:Track
Exploitation
None
Automatable
No
Tech. Impact
Partial
* Organization's Worst-case Scenario
Timeline
  • 2024-05-22 CVE Reserved
  • 2024-06-06 CVE Published
  • 2024-11-03 CVE Updated
  • 2024-12-17 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-284: Improper Access Control
  • CWE-862: Missing Authorization
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Lunary
Search vendor "Lunary"
Lunary
Search vendor "Lunary" for product "Lunary"
*-
Affected