Lucene search

K
githubGitHub Advisory DatabaseGHSA-3MWC-2CJ7-GX8C
HistoryJun 10, 2024 - 12:30 a.m.

lunary-ai/lunary Access Control Vulnerability in Prompt Variation Management

2024-06-1000:30:39
CWE-1220
GitHub Advisory Database
github.com
1
access control
vulnerability
granularity
ownership
validation
dataset
unauthorized modifications
integrity
consistency
experiments

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N

6.8 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

19.5%

In lunary-ai/lunary version 1.2.13, an insufficient granularity of access control vulnerability allows users to create, update, get, and delete prompt variations for datasets not owned by their organization. This issue arises due to the application not properly validating the ownership of dataset prompts and their variations against the organization or project of the requesting user. As a result, unauthorized modifications to dataset prompts can occur, leading to altered or removed dataset prompts without proper authorization. This vulnerability impacts the integrity and consistency of dataset information, potentially affecting the results of experiments.

Affected configurations

Vulners
Node
lunarylunaryRange<1.2.13
CPENameOperatorVersion
lunarylt1.2.13

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N

6.8 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

19.5%

Related for GHSA-3MWC-2CJ7-GX8C