// For flags

CVE-2024-5277

Weak Password Recovery Mechanism in lunary-ai/lunary

Severity Score

6.4
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Attend
*SSVC
Descriptions

In lunary-ai/lunary version 1.2.4, a vulnerability exists in the password recovery mechanism where the reset password token is not invalidated after use. This allows an attacker who compromises the recovery token to repeatedly change the password of a victim's account. The issue lies in the backend's handling of the reset password process, where the token, once used, is not discarded or invalidated, enabling its reuse. This vulnerability could lead to unauthorized account access if an attacker obtains the recovery token.

En lunary-ai/lunary versión 1.2.4, existe una vulnerabilidad en el mecanismo de recuperación de contraseña donde el token de restablecimiento de contraseña no se invalida después de su uso. Esto permite que un atacante que comprometa el token de recuperación cambie repetidamente la contraseña de la cuenta de la víctima. El problema radica en el manejo del backend del proceso de restablecimiento de contraseña, donde el token, una vez utilizado, no se descarta ni se invalida, lo que permite su reutilización. Esta vulnerabilidad podría provocar un acceso no autorizado a la cuenta si un atacante obtiene el token de recuperación.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
High
Privileges Required
Low
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
None
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
High
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:Attend
Exploitation
Poc
Automatable
No
Tech. Impact
Total
* Organization's Worst-case Scenario
Timeline
  • 2024-05-23 CVE Reserved
  • 2024-06-06 CVE Published
  • 2024-08-01 CVE Updated
  • 2024-12-17 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-640: Weak Password Recovery Mechanism for Forgotten Password
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Lunary-ai
Search vendor "Lunary-ai"
Lunary
Search vendor "Lunary-ai" for product "Lunary"
*-
Affected
Lunary
Search vendor "Lunary"
Lunary
Search vendor "Lunary" for product "Lunary"
*-
Affected