THREATINT

We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Fathom (Privacy friendly web analytics)
Zendesk (Helpdesk and Chat)

Ok

Home | EN
Support
CVE
PUBLISHED

CVE-2024-5127

Improper Access Control in lunary-ai/lunary

Assigner@huntr_ai
Reserved2024-05-19
Published2024-06-06
Updated2024-06-06

Description

In lunary-ai/lunary versions 1.2.2 through 1.2.25, an improper access control vulnerability allows users on the Free plan to invite other members and assign them any role, including those intended for Paid and Enterprise plans only. This issue arises due to insufficient backend validation of roles and permissions, enabling unauthorized users to join a project and potentially exploit roles and permissions not intended for their use. The vulnerability specifically affects the Team feature, where the backend fails to validate whether a user has paid for a plan before allowing them to send invite links with any role assigned. This could lead to unauthorized access and manipulation of project settings or data.



MEDIUM: 5.4CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N

Problem types

CWE-284 Improper Access Control

Product status

Any version before 1.2.25
affected

References

https://huntr.com/bounties/719a5db3-f943-4100-a660-011cadf1bb32

https://github.com/lunary-ai/lunary/commit/b7bd3a830a0f47ba07d0fd57bf78c4dd8a216297

cve.org CVE-2024-5127

nvd.nist.gov CVE-2024-5127

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-5127
© Copyright 2024 THREATINT. Made in Cyprus with +