In lunary-ai/lunary before version 1.4.26, the checklists.post() endpoint allows users to create or modify checklists without validating whether the user has proper permissions. This missing access control permits unauthorized users to create checklists, bypassing intended permission checks. Additionally, the endpoint does not validate the uniqueness of the slug field when creating a new checklist, allowing an attacker to spoof existing checklists by reusing the slug of an already-existing checklist. This can lead to significant data integrity issues, as legitimate checklists can be replaced with malicious or altered data.
References
Link | Resource |
---|---|
https://github.com/lunary-ai/lunary/commit/a02861ef9bb6ce860a35f7b8f178d58859cd85f0 | Patch |
https://huntr.com/bounties/f5fca549-0a4a-4f64-8ccf-d4e108856da4 | Exploit Third Party Advisory |
Configurations
History
10 Apr 2025, 18:46
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
CWE | NVD-CWE-noinfo | |
First Time |
Lunary lunary
Lunary |
|
References | () https://github.com/lunary-ai/lunary/commit/a02861ef9bb6ce860a35f7b8f178d58859cd85f0 - Patch | |
References | () https://huntr.com/bounties/f5fca549-0a4a-4f64-8ccf-d4e108856da4 - Exploit, Third Party Advisory | |
CPE | cpe:2.3:a:lunary:lunary:1.4.26:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
20 Mar 2025, 10:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-03-20 10:15
Updated : 2025-04-10 18:46
NVD link : CVE-2024-9000
Mitre link : CVE-2024-9000
CVE.ORG link : CVE-2024-9000
JSON object : View
Products Affected
lunary
- lunary
CWE