Lunary

Lunary

69 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.18%
  • Veröffentlicht 20.03.2025 10:10:37
  • Zuletzt bearbeitet 02.07.2025 19:51:11

In lunary-ai/lunary, the privilege check mechanism is flawed in version git afc5df4. The system incorrectly identifies certain endpoints as public if the path contains '/auth/' anywhere within it. This allows unauthenticated attackers to access sensi...

Exploit
  • EPSS 0.1%
  • Veröffentlicht 20.03.2025 10:10:28
  • Zuletzt bearbeitet 15.10.2025 13:15:35

In lunary-ai/lunary version 1.5.6, the `/v1/evaluators/` endpoint lacks proper access control, allowing any user associated with a project to fetch all evaluator data regardless of their role. This vulnerability permits low-privilege users to access ...

Exploit
  • EPSS 0.13%
  • Veröffentlicht 20.03.2025 10:10:28
  • Zuletzt bearbeitet 15.10.2025 13:15:56

Lunary-ai/lunary version git 105a3f6 is vulnerable to a Regular Expression Denial of Service (ReDoS) attack. The application allows users to upload their own regular expressions, which are then executed on the server side. Certain regular expressions...

Exploit
  • EPSS 0.04%
  • Veröffentlicht 20.03.2025 10:10:00
  • Zuletzt bearbeitet 02.07.2025 19:48:49

In lunary-ai/lunary before version 1.6.3, the application allows the creation of evaluators without enforcing a unique constraint on the combination of projectId and slug. This allows an attacker to overwrite existing data by submitting a POST reques...

Exploit
  • EPSS 0.07%
  • Veröffentlicht 20.03.2025 10:09:59
  • Zuletzt bearbeitet 15.10.2025 13:15:52

A broken access control vulnerability exists in lunary-ai/lunary versions 1.2.7 through 1.4.2. The vulnerability allows an authenticated attacker to modify any user's templates by sending a crafted HTTP POST request to the /v1/templates/{id}/versions...

Exploit
  • EPSS 0.09%
  • Veröffentlicht 20.03.2025 10:09:42
  • Zuletzt bearbeitet 15.10.2025 13:15:57

In lunary-ai/lunary version 1.4.28, the /checklists/:id route allows low-privilege users to modify checklists by sending a PATCH request. The route lacks proper access control, such as middleware to ensure that only authorized users (e.g., project ow...

Exploit
  • EPSS 0.07%
  • Veröffentlicht 20.03.2025 10:09:39
  • Zuletzt bearbeitet 15.10.2025 13:15:57

In lunary-ai/lunary before version 1.4.30, a privilege escalation vulnerability exists where admins can invite new members with billing permissions, thereby gaining unauthorized access to billing resources. This issue arises because the user creation...

Exploit
  • EPSS 0.13%
  • Veröffentlicht 20.03.2025 10:09:36
  • Zuletzt bearbeitet 15.10.2025 13:15:55

A vulnerability in lunary-ai/lunary, as of commit be54057, allows users to upload and execute arbitrary regular expressions on the server side. This can lead to a Denial of Service (DoS) condition, as certain regular expressions can cause excessive r...

Exploit
  • EPSS 0.09%
  • Veröffentlicht 20.03.2025 10:09:35
  • Zuletzt bearbeitet 02.07.2025 19:47:49

In lunary-ai/lunary before version 1.5.9, the /v1/evaluators/ endpoint allows users to delete evaluators of a project by sending a DELETE request. However, the route lacks proper access control, such as middleware to ensure that only users with appro...

Exploit
  • EPSS 0.03%
  • Veröffentlicht 20.03.2025 10:09:25
  • Zuletzt bearbeitet 15.10.2025 13:15:56

In lunary-ai/lunary before version 1.4.26, the checklists.post() endpoint allows users to create or modify checklists without validating whether the user has proper permissions. This missing access control permits unauthorized users to create checkli...