Lucene search

K
LunaryLunary

64 matches found

CVE
CVE
•added 2024/04/16 12:15 a.m.•102 views

CVE-2024-1738

An incorrect authorization vulnerability exists in the lunary-ai/lunary repository, specifically within the evaluations.get route in the evaluations API endpoint. This vulnerability allows unauthorized users to retrieve the results of any organization's evaluation by simply knowing the evaluation I...

7.5CVSS7.3AI score0.00167EPSS
CVE
CVE
•added 2024/10/29 1:15 p.m.•88 views

CVE-2024-7472

lunary-ai/lunary v1.2.26 contains an email injection vulnerability in the Send email verification API (/v1/users/send-verification) and Sign up API (/auth/signup). An unauthenticated attacker can inject data into outgoing emails by bypassing the extractFirstName function using a different whitespac...

6.5CVSS5.6AI score0.00308EPSS
CVE
CVE
•added 2024/05/20 9:15 a.m.•86 views

CVE-2024-3761

In lunary-ai/lunary version 1.2.2, the DELETE endpoint located at packages/backend/src/api/v1/datasets is vulnerable to unauthorized dataset deletion due to missing authorization and authentication mechanisms. This vulnerability allows any user, even those without a valid token, to delete a dataset...

9.1CVSS6.8AI score0.00228EPSS
CVE
CVE
•added 2024/04/10 5:15 p.m.•81 views

CVE-2024-1741

lunary-ai/lunary version 1.0.1 is vulnerable to improper authorization, allowing removed members to read, create, modify, and delete prompt templates using an old authorization token. Despite being removed from an organization, these members can still perform operations on prompt templates by sendi...

9.1CVSS9AI score0.00178EPSS
CVE
CVE
•added 2024/04/10 5:15 p.m.•80 views

CVE-2024-1625

An Insecure Direct Object Reference (IDOR) vulnerability exists in the lunary-ai/lunary application version 0.3.0, allowing unauthorized deletion of any organization's project. The vulnerability is due to insufficient authorization checks in the project deletion endpoint, where the endpoint fails t...

7.5CVSS6.5AI score0.00138EPSS
CVE
CVE
•added 2025/03/20 10:15 a.m.•73 views

CVE-2024-9095

In lunary-ai/lunary version v1.4.28, the /bigquery API route lacks proper access control, allowing any logged-in user to create a Datastream to Google BigQuery and export the entire database. This includes sensitive data such as password hashes and secret API keys. The route is protected by a confi...

9.8CVSS9.5AI score0.00086EPSS
CVE
CVE
•added 2025/03/20 10:15 a.m.•70 views

CVE-2024-9099

In lunary-ai/lunary version v1.4.29, the GET /projects API endpoint exposes both public and private API keys for all projects to users with minimal permissions, such as Viewers or Prompt Editors. This vulnerability allows unauthorized users to retrieve sensitive credentials, which can be used to pe...

8.8CVSS8.5AI score0.00039EPSS
CVE
CVE
•added 2024/06/27 7:15 p.m.•69 views

CVE-2024-5714

In lunary-ai/lunary version 1.2.4, an improper access control vulnerability allows members with team management permissions to manipulate project identifiers in requests, enabling them to invite users to projects in other organizations, change members to projects in other organizations with escalat...

7.4CVSS6.7AI score0.00096EPSS
CVE
CVE
•added 2025/03/20 10:15 a.m.•69 views

CVE-2024-8999

lunary-ai/lunary version v1.4.25 contains an improper access control vulnerability in the POST /api/v1/data-warehouse/bigquery endpoint. This vulnerability allows any user to export the entire database data by creating a stream to Google BigQuery without proper authentication or authorization. The ...

9.8CVSS9.2AI score0.0012EPSS
CVE
CVE
•added 2024/04/10 5:15 p.m.•68 views

CVE-2024-1740

In lunary-ai/lunary version 1.0.1, a vulnerability exists where a user removed from an organization can still read, create, modify, and delete logs by re-using an old authorization token. The lunary web application communicates with the server using an 'Authorization' token in the browser, which do...

9.1CVSS8.9AI score0.00131EPSS
CVE
CVE
•added 2024/04/10 5:15 p.m.•67 views

CVE-2024-1902

lunary-ai/lunary is vulnerable to a session reuse attack, allowing a removed user to change the organization name without proper authorization. The vulnerability stems from the lack of validation to check if a user is still part of an organization before allowing them to make changes. An attacker c...

7.5CVSS7.3AI score0.00152EPSS
CVE
CVE
•added 2024/11/14 6:15 p.m.•67 views

CVE-2024-3501

In lunary-ai/lunary versions up to and including 1.2.5, an information disclosure vulnerability exists due to the inclusion of single-use tokens in the responses of GET /v1/users/me and GET /v1/users/me/org API endpoints. These tokens, intended for sensitive operations such as password resets or ac...

9.1CVSS8.4AI score0.0007EPSS
CVE
CVE
•added 2024/06/06 7:16 p.m.•67 views

CVE-2024-5133

In lunary-ai/lunary version 1.2.4, an account takeover vulnerability exists due to the exposure of password recovery tokens in API responses. Specifically, when a user initiates the password reset process, the recovery token is included in the response of the GET /v1/users/me/org endpoint, which li...

9.1CVSS8.7AI score0.00245EPSS
CVE
CVE
•added 2024/11/01 12:15 p.m.•63 views

CVE-2024-7456

A SQL injection vulnerability exists in the /api/v1/external-users route of lunary-ai/lunary version v1.4.2. The order by clause of the SQL query uses sql.unsafe without prior sanitization, allowing for SQL injection. The orderByClause variable is constructed without server-side validation or sanit...

9.8CVSS10AI score0.17935EPSS
CVE
CVE
•added 2024/09/13 5:15 p.m.•62 views

CVE-2024-6087

An improper access control vulnerability exists in lunary-ai/lunary at the latest commit (a761d83) on the main branch. The vulnerability allows an attacker to use the auth tokens issued by the 'invite user' functionality to obtain valid JWT tokens. These tokens can be used to compromise target user...

6.5CVSS6.5AI score0.00102EPSS
CVE
CVE
•added 2024/05/20 3:15 p.m.•52 views

CVE-2024-4151

An Improper Access Control vulnerability exists in lunary-ai/lunary version 1.2.2, where users can view and update any prompts in any projects due to insufficient access control checks in the handling of PATCH and GET requests for template versions. This vulnerability allows unauthorized users to m...

8.3CVSS6.6AI score0.00095EPSS
CVE
CVE
•added 2024/06/06 7:16 p.m.•52 views

CVE-2024-5128

An Insecure Direct Object Reference (IDOR) vulnerability was identified in lunary-ai/lunary, affecting versions up to and including 1.2.2. This vulnerability allows unauthorized users to view, update, or delete any dataset_prompt or dataset_prompt_variation within any dataset or project. The issue ...

9.4CVSS9AI score0.0015EPSS
CVE
CVE
•added 2024/11/14 7:15 p.m.•51 views

CVE-2024-3760

In lunary-ai/lunary version 1.2.7, there is a lack of rate limiting on the forgot password page, leading to an email bombing vulnerability. Attackers can exploit this by automating forgot password requests to flood targeted user accounts with a high volume of password reset emails. This not only ov...

7.5CVSS7.5AI score0.00092EPSS
CVE
CVE
•added 2024/04/16 12:15 a.m.•49 views

CVE-2024-1626

An Insecure Direct Object Reference (IDOR) vulnerability exists in the lunary-ai/lunary repository, version 0.3.0, within the project update endpoint. The vulnerability allows authenticated users to modify the name of any project within the system without proper authorization checks, by directly re...

9.1CVSS6.4AI score0.00103EPSS
CVE
CVE
•added 2024/06/06 7:16 p.m.•49 views

CVE-2024-5248

In lunary-ai/lunary version 1.2.5, an improper access control vulnerability exists due to a missing permission check in the GET /v1/users/me/org endpoint. The platform's role definitions restrict the Prompt Editor role to prompt management and project viewing/listing capabilities, explicitly exclud...

6.5CVSS6.3AI score0.00265EPSS
CVE
CVE
•added 2024/04/16 12:15 a.m.•48 views

CVE-2024-1666

In lunary-ai/lunary version 1.0.0, an authorization flaw exists that allows unauthorized radar creation. The vulnerability stems from the lack of server-side checks to verify if a user is on a free account during the radar creation process, which is only enforced in the web UI. As a result, attacke...

7.5CVSS7.5AI score0.00143EPSS
CVE
CVE
•added 2025/03/20 10:15 a.m.•47 views

CVE-2024-8998

A Regular Expression Denial of Service (ReDoS) vulnerability exists in lunary-ai/lunary version git f07a845. The server uses the regex /{.*?}/ to match user-controlled strings. In the default JavaScript regex engine, this regex can take polynomial time to match certain crafted user inputs. As a res...

7.5CVSS7.3AI score0.00144EPSS
CVE
CVE
•added 2024/06/06 7:16 p.m.•46 views

CVE-2024-5131

An Improper Access Control vulnerability exists in the lunary-ai/lunary repository, affecting versions up to and including 1.2.2. The vulnerability allows unauthorized users to view any prompts in any projects by supplying a specific prompt ID to an endpoint that does not adequately verify the owne...

7.5CVSS6.7AI score0.00207EPSS
CVE
CVE
•added 2024/06/06 7:16 p.m.•46 views

CVE-2024-5478

A Cross-site Scripting (XSS) vulnerability exists in the SAML metadata endpoint /auth/saml/${org?.id}/metadata of lunary-ai/lunary version 1.2.7. The vulnerability arises due to the application's failure to escape or validate the orgId parameter supplied by the user before incorporating it into the...

7.4CVSS6.2AI score0.00225EPSS
CVE
CVE
•added 2024/04/16 12:15 a.m.•45 views

CVE-2024-1739

lunary-ai/lunary is vulnerable to an authentication issue due to improper validation of email addresses during the signup process. Specifically, the server fails to treat email addresses as case insensitive, allowing the creation of multiple accounts with the same email address by varying the case ...

9.1CVSS7AI score0.00131EPSS
CVE
CVE
•added 2024/05/21 6:15 p.m.•45 views

CVE-2024-4154

In lunary-ai/lunary version 1.2.2, an incorrect synchronization vulnerability allows unprivileged users to rename projects they do not have access to. Specifically, an unprivileged user can send a PATCH request to the project's endpoint with a new name for a project, despite not having the necessar...

7.1CVSS6.8AI score0.00138EPSS
CVE
CVE
•added 2024/06/06 7:16 p.m.•45 views

CVE-2024-5126

An improper access control vulnerability exists in the lunary-ai/lunary repository, specifically within the versions.patch functionality for updating prompts. Affected versions include 1.2.2 up to but not including 1.2.25. The vulnerability allows unauthorized users to update prompt details due to ...

7.6CVSS6.7AI score0.00138EPSS
CVE
CVE
•added 2024/06/06 7:16 p.m.•45 views

CVE-2024-5328

A Server-Side Request Forgery (SSRF) vulnerability exists in the lunary-ai/lunary application, specifically within the endpoint '/auth/saml/tto/download-idp-xml'. The vulnerability arises due to the application's failure to validate user-supplied URLs before using them in server-side requests. An a...

9.3CVSS8.4AI score0.00146EPSS
CVE
CVE
•added 2024/09/13 5:15 p.m.•45 views

CVE-2024-6862

A Cross-Site Request Forgery (CSRF) vulnerability exists in lunary-ai/lunary version 1.2.34 due to overly permissive CORS settings. This vulnerability allows an attacker to sign up for and create projects or use the instance as if they were a user with local access. The main attack vector is for in...

8.1CVSS7.6AI score0.00076EPSS
CVE
CVE
•added 2024/10/29 1:15 p.m.•45 views

CVE-2024-7475

An improper access control vulnerability in lunary-ai/lunary version 1.3.2 allows an attacker to update the SAML configuration without authorization. This vulnerability can lead to manipulation of authentication processes, fraudulent login requests, and theft of user information. Appropriate access...

9.1CVSS9.5AI score0.00158EPSS
CVE
CVE
•added 2024/10/29 1:15 p.m.•44 views

CVE-2024-7474

In version 1.3.2 of lunary-ai/lunary, an Insecure Direct Object Reference (IDOR) vulnerability exists. A user can view or delete external users by manipulating the 'id' parameter in the request URL. The application does not perform adequate checks on the 'id' parameter, allowing unauthorized access...

9.1CVSS8.8AI score0.00129EPSS
CVE
CVE
•added 2024/10/29 1:15 p.m.•43 views

CVE-2024-7473

An IDOR vulnerability exists in the 'Evaluations' function of the 'umgws datasets' section in lunary-ai/lunary versions 1.3.2. This vulnerability allows an authenticated user to update other users' prompts by manipulating the 'id' parameter in the request. The issue is fixed in version 1.4.3.

7.5CVSS6.8AI score0.00061EPSS
CVE
CVE
•added 2025/03/20 10:15 a.m.•43 views

CVE-2024-9096

In lunary-ai/lunary version 1.4.28, the /checklists/:id route allows low-privilege users to modify checklists by sending a PATCH request. The route lacks proper access control, such as middleware to ensure that only authorized users (e.g., project owners or admins) can modify checklist data. This v...

7.6CVSS7.4AI score0.00044EPSS
CVE
CVE
•added 2024/06/06 7:16 p.m.•42 views

CVE-2024-5129

A Privilege Escalation Vulnerability exists in lunary-ai/lunary version 1.2.2, where any user can delete any datasets due to missing authorization checks. The vulnerability is present in the dataset deletion functionality, where the application fails to verify if the user requesting the deletion ha...

8.2CVSS8AI score0.00152EPSS
CVE
CVE
•added 2025/03/20 10:15 a.m.•42 views

CVE-2024-9098

In lunary-ai/lunary before version 1.4.30, a privilege escalation vulnerability exists where admins can invite new members with billing permissions, thereby gaining unauthorized access to billing resources. This issue arises because the user creation endpoint does not restrict admins from inviting ...

7.3CVSS7.3AI score0.00041EPSS
CVE
CVE
•added 2025/03/20 10:15 a.m.•41 views

CVE-2024-11137

An Insecure Direct Object Reference (IDOR) vulnerability exists in the PATCH /v1/runs/:id/score endpoint of lunary-ai/lunary version 1.6.0. This vulnerability allows an attacker to update the score data of any run by manipulating the id parameter in the request URL, which corresponds to the runId_s...

7.5CVSS7.3AI score0.00054EPSS
CVE
CVE
•added 2024/11/14 6:15 p.m.•41 views

CVE-2024-3502

In lunary-ai/lunary versions up to and including 1.2.5, an information disclosure vulnerability exists where account recovery hashes of users are inadvertently exposed to unauthorized actors. This issue occurs when authenticated users inspect responses from GET /v1/users/me and GET /v1/users/me/org...

9.1CVSS8.2AI score0.00063EPSS
CVE
CVE
•added 2024/06/08 8:15 p.m.•41 views

CVE-2024-4146

In lunary-ai/lunary version v1.2.13, an incorrect authorization vulnerability exists that allows unauthorized users to access and manipulate projects within an organization they should not have access to. Specifically, the vulnerability is located in the checkProjectAccess method within the authori...

9.8CVSS9.5AI score0.00141EPSS
CVE
CVE
•added 2024/06/09 11:15 p.m.•41 views

CVE-2024-5389

In lunary-ai/lunary version 1.2.13, an insufficient granularity of access control vulnerability allows users to create, update, get, and delete prompt variations for datasets not owned by their organization. This issue arises due to the application not properly validating the ownership of dataset p...

8.1CVSS6.6AI score0.00092EPSS
CVE
CVE
•added 2025/03/20 10:15 a.m.•41 views

CVE-2025-0281

A stored cross-site scripting (XSS) vulnerability exists in lunary-ai/lunary versions 1.6.7 and earlier. An attacker can inject malicious JavaScript into the SAML IdP XML metadata, which is used to generate the SAML login redirect URL. This URL is then set as the value of window.location.href witho...

7.3CVSS5.6AI score0.00054EPSS
CVE
CVE
•added 2024/06/06 6:15 p.m.•40 views

CVE-2024-3504

An improper access control vulnerability exists in lunary-ai/lunary versions up to and including 1.2.2, where an admin can update any organization user to the organization owner. This vulnerability allows the elevated user to delete projects within the organization. The issue is resolved in version...

8.1CVSS7.1AI score0.00132EPSS
CVE
CVE
•added 2024/09/13 5:15 p.m.•40 views

CVE-2024-6867

An information disclosure vulnerability exists in the lunary-ai/lunary, specifically in the runs/{run_id}/related endpoint. This endpoint does not verify that the user has the necessary access rights to the run(s) they are accessing. As a result, it returns not only the specified run but also all r...

6.5CVSS4.5AI score0.00097EPSS
CVE
CVE
•added 2024/11/14 6:15 p.m.•39 views

CVE-2024-3379

In lunary-ai/lunary versions 1.2.2 through 1.2.6, an incorrect authorization vulnerability allows unprivileged users to re-generate the private key for projects they do not have access to. Specifically, a user with a 'Member' role can issue a request to regenerate the private key of a project witho...

9.6CVSS8.7AI score0.00056EPSS
CVE
CVE
•added 2025/03/20 10:15 a.m.•38 views

CVE-2024-10275

In version 1.5.5 of lunary-ai/lunary, a vulnerability exists where admins, who do not have direct permissions to access billing resources, can change the permissions of existing users to include billing permissions. This can lead to a privilege escalation scenario where an administrator can manage ...

7.3CVSS7.3AI score0.00045EPSS
CVE
CVE
•added 2024/09/13 5:15 p.m.•38 views

CVE-2024-6582

A broken access control vulnerability exists in the latest version of lunary-ai/lunary. The saml.ts file allows a user from one organization to update the Identity Provider (IDP) settings and view the SSO metadata of another organization. This vulnerability can lead to unauthorized access and poten...

6.5CVSS4.9AI score0.00116EPSS
CVE
CVE
•added 2025/03/20 10:15 a.m.•38 views

CVE-2024-8789

Lunary-ai/lunary version git 105a3f6 is vulnerable to a Regular Expression Denial of Service (ReDoS) attack. The application allows users to upload their own regular expressions, which are then executed on the server side. Certain regular expressions can have exponential runtime complexity relative...

7.5CVSS7.6AI score0.00144EPSS
CVE
CVE
•added 2024/06/27 7:15 p.m.•37 views

CVE-2024-6086

In version 1.2.7 of lunary-ai/lunary, any authenticated user, regardless of their role, can change the name of an organization due to improper access control. The function checkAccess() is not implemented, allowing users with the lowest privileges, such as the 'Prompt Editor' role, to modify organi...

5.3CVSS4.7AI score0.00098EPSS
CVE
CVE
•added 2025/03/20 10:15 a.m.•37 views

CVE-2024-8765

In lunary-ai/lunary, the privilege check mechanism is flawed in version git afc5df4. The system incorrectly identifies certain endpoints as public if the path contains '/auth/' anywhere within it. This allows unauthenticated attackers to access sensitive endpoints by including '/auth/' in the path....

7.3CVSS7.2AI score0.00176EPSS
CVE
CVE
•added 2025/03/20 10:15 a.m.•36 views

CVE-2024-10272

lunary-ai/lunary is vulnerable to broken access control in the latest version. An attacker can view the content of any dataset without any kind of authorization by sending a GET request to the /v1/datasets endpoint without a valid authorization token.

7.5CVSS7.5AI score0.00062EPSS
CVE
CVE
•added 2024/06/06 6:15 p.m.•36 views

CVE-2024-5277

In lunary-ai/lunary version 1.2.4, a vulnerability exists in the password recovery mechanism where the reset password token is not invalidated after use. This allows an attacker who compromises the recovery token to repeatedly change the password of a victim's account. The issue lies in the backend...

7.5CVSS6.5AI score0.00132EPSS
Total number of security vulnerabilities64