{ "id": "CVE-2024-1741", "sourceIdentifier": "security@huntr.dev", "published": "2024-04-10T17:15:53.483", "lastModified": "2025-01-31T11:15:10.397", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", "value": "lunary-ai/lunary version 1.0.1 is vulnerable to improper authorization, allowing removed members to read, create, modify, and delete prompt templates using an old authorization token. Despite being removed from an organization, these members can still perform operations on prompt templates by sending HTTP requests with their previously captured authorization token. This issue exposes organizations to unauthorized access and manipulation of sensitive template data." }, { "lang": "es", "value": "lunary-ai/lunary versi\u00f3n 1.0.1 es vulnerable a una autorizaci\u00f3n inadecuada, lo que permite a los miembros eliminados leer, crear, modificar y eliminar plantillas de mensajes utilizando un token de autorizaci\u00f3n antiguo. A pesar de haber sido eliminados de una organizaci\u00f3n, estos miembros a\u00fan pueden realizar operaciones en plantillas de mensajes enviando solicitudes HTTP con su token de autorizaci\u00f3n previamente capturado. Este problema expone a las organizaciones a acceso no autorizado y manipulaci\u00f3n de datos confidenciales de plantillas." } ], "metrics": { "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "baseScore": 9.1, "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "NONE" }, "exploitabilityScore": 3.9, "impactScore": 5.2 } ], "cvssMetricV30": [ { "source": "security@huntr.dev", "type": "Secondary", "cvssData": { "version": "3.0", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "baseScore": 9.1, "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "NONE" }, "exploitabilityScore": 3.9, "impactScore": 5.2 } ] }, "weaknesses": [ { "source": "security@huntr.dev", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-863" } ] }, { "source": "nvd@nist.gov", "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-863" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:lunary:lunary:*:*:*:*:*:*:*:*", "versionEndExcluding": "1.2.8", "matchCriteriaId": "861B7DD6-6AAA-48C1-94F7-687729B042B6" } ] } ] } ], "references": [ { "url": "https://github.com/lunary-ai/lunary/commit/d8e2e73efd53ab4e92cf47bbf4b639a9f08853d2", "source": "security@huntr.dev", "tags": [ "Patch" ] }, { "url": "https://huntr.com/bounties/671bd040-1cc5-4227-8182-5904e9c5ed3b", "source": "security@huntr.dev", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ] }, { "url": "https://github.com/lunary-ai/lunary/commit/d8e2e73efd53ab4e92cf47bbf4b639a9f08853d2", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ] }, { "url": "https://huntr.com/bounties/671bd040-1cc5-4227-8182-5904e9c5ed3b", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ] } ] }