A Regular Expression Denial of Service (ReDoS) vulnerability exists in the lunary-ai/lunary application, version 1.2.10. An attacker can exploit this vulnerability by maliciously manipulating regular expressions, which can significantly impact the response time of the application and potentially render it completely non-functional. Specifically, the vulnerability can be triggered by sending a specially crafted request to the application, leading to a denial of service where the application crashes.
References
Link | Resource |
---|---|
https://github.com/lunary-ai/lunary/commit/1e8a3d941ba5cfef2c478dd5bac4e4a4b4d67830 | |
https://huntr.com/bounties/eca4ad45-2a38-4f3c-9ec1-8205cd51be31 | Exploit Third Party Advisory |
https://huntr.com/bounties/eca4ad45-2a38-4f3c-9ec1-8205cd51be31 | Exploit Third Party Advisory |
Configurations
History
30 Jan 2025, 13:15
Type | Values Removed | Values Added |
---|---|---|
CWE | ||
References |
|
08 Jan 2025, 16:29
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:lunary:lunary:1.2.10:*:*:*:*:*:*:* | |
CWE | CWE-1333 | |
References | () https://huntr.com/bounties/eca4ad45-2a38-4f3c-9ec1-8205cd51be31 - Exploit, Third Party Advisory | |
First Time |
Lunary lunary
Lunary |
Information
Published : 2024-06-01 16:15
Updated : 2025-01-30 13:15
NVD link : CVE-2024-4148
Mitre link : CVE-2024-4148
CVE.ORG link : CVE-2024-4148
JSON object : View
Products Affected
lunary
- lunary
CWE
CWE-1333
Inefficient Regular Expression Complexity