An improper access control vulnerability in lunary-ai/lunary version 1.3.2 allows an attacker to update the SAML configuration without authorization. This vulnerability can lead to manipulation of authentication processes, fraudulent login requests, and theft of user information. Appropriate access controls should be implemented to ensure that the SAML configuration can only be updated by authorized users.
References
Link | Resource |
---|---|
https://github.com/lunary-ai/lunary/commit/8f563c77d8614a72980113f530c7a9ec15a5f8d5 | Patch |
https://huntr.com/bounties/78c824f7-3b6d-443d-bb76-0f8031c6c126 | Exploit Issue Tracking Third Party Advisory |
Configurations
History
04 Nov 2024, 13:55
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:lunary:lunary:*:*:*:*:*:*:*:* | |
CWE | NVD-CWE-Other | |
First Time |
Lunary
Lunary lunary |
|
Summary |
|
|
References | () https://github.com/lunary-ai/lunary/commit/8f563c77d8614a72980113f530c7a9ec15a5f8d5 - Patch | |
References | () https://huntr.com/bounties/78c824f7-3b6d-443d-bb76-0f8031c6c126 - Exploit, Issue Tracking, Third Party Advisory |
29 Oct 2024, 13:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-10-29 13:15
Updated : 2024-11-04 13:55
NVD link : CVE-2024-7475
Mitre link : CVE-2024-7475
CVE.ORG link : CVE-2024-7475
JSON object : View
Products Affected
lunary
- lunary
CWE