CVE-2024-10275
- EPSS 0.1%
- Veröffentlicht 20.03.2025 10:09:15
- Zuletzt bearbeitet 15.10.2025 13:15:35
In version 1.5.5 of lunary-ai/lunary, a vulnerability exists where admins, who do not have direct permissions to access billing resources, can change the permissions of existing users to include billing permissions. This can lead to a privilege escal...
CVE-2024-10274
- EPSS 0.1%
- Veröffentlicht 20.03.2025 10:09:05
- Zuletzt bearbeitet 15.10.2025 13:15:34
An improper authorization vulnerability exists in lunary-ai/lunary version 1.5.5. The /users/me/org endpoint lacks adequate access control mechanisms, allowing unauthorized users to access sensitive information about all team members in the current o...
CVE-2024-11137
- EPSS 0.08%
- Veröffentlicht 20.03.2025 10:09:01
- Zuletzt bearbeitet 15.10.2025 13:15:38
An Insecure Direct Object Reference (IDOR) vulnerability exists in the `PATCH /v1/runs/:id/score` endpoint of lunary-ai/lunary version 1.6.0. This vulnerability allows an attacker to update the score data of any run by manipulating the id parameter i...
CVE-2024-8763
- EPSS 0.13%
- Veröffentlicht 20.03.2025 10:08:56
- Zuletzt bearbeitet 15.10.2025 13:15:55
A Regular Expression Denial of Service (ReDoS) vulnerability exists in the lunary-ai/lunary repository, specifically in the compileTextTemplate function. The affected version is git be54057. An attacker can exploit this vulnerability by manipulating ...
CVE-2024-8999
- EPSS 0.11%
- Veröffentlicht 20.03.2025 10:08:51
- Zuletzt bearbeitet 15.10.2025 13:15:56
lunary-ai/lunary version v1.4.25 contains an improper access control vulnerability in the POST /api/v1/data-warehouse/bigquery endpoint. This vulnerability allows any user to export the entire database data by creating a stream to Google BigQuery wit...
CVE-2024-10273
- EPSS 0.07%
- Veröffentlicht 20.03.2025 10:08:48
- Zuletzt bearbeitet 15.10.2025 13:15:34
In lunary-ai/lunary v1.5.0, improper privilege management in the models.ts file allows users with viewer roles to modify models owned by others. The PATCH endpoint for models does not have appropriate privilege checks, enabling low-privilege users to...
CVE-2024-9095
- EPSS 0.12%
- Veröffentlicht 20.03.2025 10:08:47
- Zuletzt bearbeitet 15.10.2025 13:15:57
In lunary-ai/lunary version v1.4.28, the /bigquery API route lacks proper access control, allowing any logged-in user to create a Datastream to Google BigQuery and export the entire database. This includes sensitive data such as password hashes and s...
CVE-2024-3760
- EPSS 0.18%
- Veröffentlicht 14.11.2024 19:15:06
- Zuletzt bearbeitet 18.11.2024 22:02:15
In lunary-ai/lunary version 1.2.7, there is a lack of rate limiting on the forgot password page, leading to an email bombing vulnerability. Attackers can exploit this by automating forgot password requests to flood targeted user accounts with a high ...
CVE-2024-3502
- EPSS 0.17%
- Veröffentlicht 14.11.2024 18:15:18
- Zuletzt bearbeitet 15.10.2025 13:15:43
In lunary-ai/lunary versions up to and including 1.2.5, an information disclosure vulnerability exists where account recovery hashes of users are inadvertently exposed to unauthorized actors. This issue occurs when authenticated users inspect respons...
CVE-2024-3501
- EPSS 0.16%
- Veröffentlicht 14.11.2024 18:15:18
- Zuletzt bearbeitet 30.01.2025 13:15:09
In lunary-ai/lunary versions up to and including 1.2.5, an information disclosure vulnerability exists due to the inclusion of single-use tokens in the responses of `GET /v1/users/me` and `GET /v1/users/me/org` API endpoints. These tokens, intended f...