Products
lunary-ai/lunary
- 1.2.34
Source
security@huntr.dev
Tags
CVE-2024-6862 details
Published : Sept. 13, 2024, 5:15 p.m.
Last Modified : Sept. 13, 2024, 5:15 p.m.
Last Modified : Sept. 13, 2024, 5:15 p.m.
Description
A Cross-Site Request Forgery (CSRF) vulnerability exists in lunary-ai/lunary version 1.2.34 due to overly permissive CORS settings. This vulnerability allows an attacker to sign up for and create projects or use the instance as if they were a user with local access. The main attack vector is for instances hosted locally on personal machines, which are not publicly accessible. The CORS settings in the backend permit all origins, exposing unauthenticated endpoints to CSRF attacks.
CVSS Score
1 | 2 | 3 | 4 | 5 | 6 | 7.4 | 8 | 9 | 10 |
---|
Weakness
Weakness | Name | Description |
---|---|---|
CWE-352 | Cross-Site Request Forgery (CSRF) | The web application does not, or can not, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request. |
CVSS Data
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
Base Score
7.4
Exploitability Score
2.8
Impact Score
4.0
Base Severity
HIGH
Vector String : CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N
References
URL | Source |
---|---|
https://github.com/lunary-ai/lunary/commit/3451fcd7b9d95e9091d62c515752f39f2faa6e54 | security@huntr.dev |
https://huntr.com/bounties/0b1d851e-3455-480c-ad5a-23565894976f | security@huntr.dev |
This website uses the NVD API, but is not approved or certified by it.