THREATINT

We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Fathom (Privacy friendly web analytics)
Zendesk (Helpdesk and Chat)

Ok

Home | EN
Support
CVE
PUBLISHED

CVE-2024-5133

Account Takeover via Exposed Recovery Token in lunary-ai/lunary

Assigner@huntr_ai
Reserved2024-05-19
Published2024-06-06
Updated2024-06-07

Description

In lunary-ai/lunary version 1.2.4, an account takeover vulnerability exists due to the exposure of password recovery tokens in API responses. Specifically, when a user initiates the password reset process, the recovery token is included in the response of the `GET /v1/users/me/org` endpoint, which lists all users in a team. This allows any authenticated user to capture the recovery token of another user and subsequently change that user's password without consent, effectively taking over the account. The issue lies in the inclusion of the `recovery_token` attribute in the users object returned by the API.



CRITICAL: 9.1CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

Problem types

CWE-200 Exposure of Sensitive Information to an Unauthorized Actor

Product status

Any version
affected

References

https://huntr.com/bounties/6057598d-93c4-4a94-bb80-5bd508013c5b

cve.org CVE-2024-5133

nvd.nist.gov CVE-2024-5133

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-5133
© Copyright 2024 THREATINT. Made in Cyprus with +