In lunary-ai/lunary before version 1.6.3, the application allows the creation of evaluators without enforcing a unique constraint on the combination of projectId and slug. This allows an attacker to overwrite existing data by submitting a POST request with the same slug as an existing evaluator. The lack of database constraints or application-layer validation to prevent duplicates exposes the application to data integrity issues. This vulnerability can result in corrupted data and potentially malicious actions, impairing the system's functionality.
References
Link | Resource |
---|---|
https://github.com/lunary-ai/lunary/commit/79dc370596d979b756f6ea0250d97a2d02385ecd | Patch |
https://huntr.com/bounties/3d99aca5-b135-4833-b48b-7806bc4bf861 | Exploit Third Party Advisory |
Configurations
History
02 Jul 2025, 19:48
Type | Values Removed | Values Added |
---|---|---|
First Time |
Lunary
Lunary lunary |
|
CPE | cpe:2.3:a:lunary:lunary:*:*:*:*:*:*:*:* | |
Summary |
|
|
References | () https://github.com/lunary-ai/lunary/commit/79dc370596d979b756f6ea0250d97a2d02385ecd - Patch | |
References | () https://huntr.com/bounties/3d99aca5-b135-4833-b48b-7806bc4bf861 - Exploit, Third Party Advisory |
20 Mar 2025, 10:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-03-20 10:15
Updated : 2025-07-02 19:48
NVD link : CVE-2024-11301
Mitre link : CVE-2024-11301
CVE.ORG link : CVE-2024-11301
JSON object : View
Products Affected
lunary
- lunary
CWE
CWE-837
Improper Enforcement of a Single, Unique Action