An Insecure Direct Object Reference (IDOR) vulnerability exists in the lunary-ai/lunary application version 0.3.0, allowing unauthorized deletion of any organization's project. The vulnerability is due to insufficient authorization checks in the project deletion endpoint, where the endpoint fails to verify if the project ID provided in the request belongs to the requesting user's organization. As a result, an attacker can delete projects belonging to any organization by sending a crafted DELETE request with the target project's ID. This issue affects the project deletion functionality implemented in the projects.delete route.
References
Link | Resource |
---|---|
https://github.com/lunary-ai/lunary/commit/88f98e29f19da9d1f5de45c5b163fd5b48e0bcec | Patch |
https://huntr.com/bounties/cf6dd625-e6c9-44df-a072-13686816de21 | Exploit Issue Tracking Patch Third Party Advisory |
https://github.com/lunary-ai/lunary/commit/88f98e29f19da9d1f5de45c5b163fd5b48e0bcec | Patch |
https://huntr.com/bounties/cf6dd625-e6c9-44df-a072-13686816de21 | Exploit Issue Tracking Patch Third Party Advisory |
Configurations
History
30 Jan 2025, 13:15
Type | Values Removed | Values Added |
---|---|---|
CWE |
08 Jan 2025, 18:58
Type | Values Removed | Values Added |
---|---|---|
First Time |
Lunary lunary
Lunary |
|
References | () https://github.com/lunary-ai/lunary/commit/88f98e29f19da9d1f5de45c5b163fd5b48e0bcec - Patch | |
References | () https://huntr.com/bounties/cf6dd625-e6c9-44df-a072-13686816de21 - Exploit, Issue Tracking, Patch, Third Party Advisory | |
CWE | CWE-639 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
CPE | cpe:2.3:a:lunary:lunary:0.3.0:*:*:*:*:*:*:* |
Information
Published : 2024-04-10 17:15
Updated : 2025-01-30 13:15
NVD link : CVE-2024-1625
Mitre link : CVE-2024-1625
CVE.ORG link : CVE-2024-1625
JSON object : View
Products Affected
lunary
- lunary
CWE
CWE-639
Authorization Bypass Through User-Controlled Key