A Regular Expression Denial of Service (ReDoS) vulnerability exists in lunary-ai/lunary version git f07a845. The server uses the regex /{.*?}/ to match user-controlled strings. In the default JavaScript regex engine, this regex can take polynomial time to match certain crafted user inputs. As a result, an attacker can cause the server to hang for an arbitrary amount of time by submitting a specially crafted payload. This issue is fixed in version 1.4.26.
References
Configurations
History
04 Apr 2025, 09:15
Type | Values Removed | Values Added |
---|---|---|
CWE |
01 Apr 2025, 20:30
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:lunary:lunary:*:*:*:*:*:*:*:* | |
First Time |
Lunary lunary
Lunary |
|
References | () https://github.com/lunary-ai/lunary/commit/f2bfa036caf2c48686474f4560a9c5abcf5f43b7 - Patch | |
References | () https://huntr.com/bounties/4dbd8648-1dca-4f95-b74f-978ef030e97e - Exploit | |
CWE | CWE-1333 |
20 Mar 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References | () https://huntr.com/bounties/4dbd8648-1dca-4f95-b74f-978ef030e97e - |
20 Mar 2025, 10:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-03-20 10:15
Updated : 2025-04-04 09:15
NVD link : CVE-2024-8998
Mitre link : CVE-2024-8998
CVE.ORG link : CVE-2024-8998
JSON object : View
Products Affected
lunary
- lunary
CWE
CWE-1333
Inefficient Regular Expression Complexity