In lunary-ai/lunary v1.5.0, improper privilege management in the models.ts file allows users with viewer roles to modify models owned by others. The PATCH endpoint for models does not have appropriate privilege checks, enabling low-privilege users to update models they should not have access to modify. This vulnerability could lead to unauthorized changes in critical resources, affecting the integrity and reliability of the system.
References
Link | Resource |
---|---|
https://github.com/lunary-ai/lunary/commit/8ba1b8ba2c2c30b1cec30eb5777c1fda670cbbfc | Patch |
https://huntr.com/bounties/883d9fe2-5730-41e1-a5c2-59972489876e | Exploit Third Party Advisory |
Configurations
History
02 Jul 2025, 19:35
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:lunary:lunary:*:*:*:*:*:*:*:* | |
Summary |
|
|
First Time |
Lunary
Lunary lunary |
|
References | () https://github.com/lunary-ai/lunary/commit/8ba1b8ba2c2c30b1cec30eb5777c1fda670cbbfc - Patch | |
References | () https://huntr.com/bounties/883d9fe2-5730-41e1-a5c2-59972489876e - Exploit, Third Party Advisory |
20 Mar 2025, 10:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-03-20 10:15
Updated : 2025-07-02 19:35
NVD link : CVE-2024-10273
Mitre link : CVE-2024-10273
CVE.ORG link : CVE-2024-10273
JSON object : View
Products Affected
lunary
- lunary
CWE
CWE-269
Improper Privilege Management