// For flags

CVE-2024-5478

Cross-site Scripting (XSS) in SAML metadata endpoint in lunary-ai/lunary

Severity Score

6.1
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Attend
*SSVC
Descriptions

A Cross-site Scripting (XSS) vulnerability exists in the SAML metadata endpoint `/auth/saml/${org?.id}/metadata` of lunary-ai/lunary version 1.2.7. The vulnerability arises due to the application's failure to escape or validate the `orgId` parameter supplied by the user before incorporating it into the generated response. Specifically, the endpoint generates XML responses for SAML metadata, where the `orgId` parameter is directly embedded into the XML structure without proper sanitization or validation. This flaw allows an attacker to inject arbitrary JavaScript code into the generated SAML metadata page, leading to potential theft of user cookies or authentication tokens.

Existe una vulnerabilidad de Cross-site Scripting (XSS) en el endpoint de metadatos SAML `/auth/saml/${org?.id}/metadata` de lunary-ai/lunary versión 1.2.7. La vulnerabilidad surge debido a que la aplicación no logra escapar o validar el parámetro `orgId` proporcionado por el usuario antes de incorporarlo a la respuesta generada. Específicamente, el endpoint genera respuestas XML para metadatos SAML, donde el parámetro `orgId` está directamente incrustado en la estructura XML sin una sanitización o validación adecuada. Esta falla permite a un atacante inyectar código JavaScript arbitrario en la página de metadatos SAML generada, lo que lleva a un posible robo de cookies o tokens de autenticación del usuario.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
None
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Changed
Confidentiality
High
Integrity
None
Availability
None
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:Attend
Exploitation
Poc
Automatable
No
Tech. Impact
Total
* Organization's Worst-case Scenario
Timeline
  • 2024-05-29 CVE Reserved
  • 2024-06-06 CVE Published
  • 2024-07-20 EPSS Updated
  • 2024-08-01 CVE Updated
  • 2024-08-01 First Exploit
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CAPEC
References (1)
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Lunary
Search vendor "Lunary"
Lunary
Search vendor "Lunary" for product "Lunary"
1.2.7
Search vendor "Lunary" for product "Lunary" and version "1.2.7"
-
Affected