Lucene search

K
cvelist@huntr_aiCVELIST:CVE-2024-5755
HistoryJun 27, 2024 - 6:45 p.m.

CVE-2024-5755 Email Validation Bypass in lunary-ai/lunary

2024-06-2718:45:48
CWE-821
@huntr_ai
www.cve.org
2
email validation bypass
lunary-ai
v1.2.11
dot character
incorrect synchronization
potential security issues

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

0.0004 Low

EPSS

Percentile

9.1%

In lunary-ai/lunary versions <=v1.2.11, an attacker can bypass email validation by using a dot character (‘.’) in the email address. This allows the creation of multiple accounts with essentially the same email address (e.g., ‘[email protected]’ and ‘[email protected]’), leading to incorrect synchronization and potential security issues.

CNA Affected

[
  {
    "vendor": "lunary-ai",
    "product": "lunary-ai/lunary",
    "versions": [
      {
        "version": "unspecified",
        "status": "affected",
        "versionType": "custom",
        "lessThanOrEqual": "latest"
      }
    ]
  }
]

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

0.0004 Low

EPSS

Percentile

9.1%

Related for CVELIST:CVE-2024-5755