Lunary

Lunary

69 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.08%
  • Veröffentlicht 27.06.2024 19:15:19
  • Zuletzt bearbeitet 15.10.2025 13:15:49

In version 1.2.7 of lunary-ai/lunary, any authenticated user, regardless of their role, can change the name of an organization due to improper access control. The function checkAccess() is not implemented, allowing users with the lowest privileges, s...

Exploit
  • EPSS 0.05%
  • Veröffentlicht 27.06.2024 19:15:16
  • Zuletzt bearbeitet 21.11.2024 09:48:17

In lunary-ai/lunary versions <=v1.2.11, an attacker can bypass email validation by using a dot character ('.') in the email address. This allows the creation of multiple accounts with essentially the same email address (e.g., 'attacker123@gmail.com' ...

Exploit
  • EPSS 0.09%
  • Veröffentlicht 27.06.2024 19:15:15
  • Zuletzt bearbeitet 15.10.2025 13:15:47

In lunary-ai/lunary version 1.2.4, an improper access control vulnerability allows members with team management permissions to manipulate project identifiers in requests, enabling them to invite users to projects in other organizations, change member...

Exploit
  • EPSS 0.13%
  • Veröffentlicht 09.06.2024 23:15:50
  • Zuletzt bearbeitet 21.11.2024 09:47:33

In lunary-ai/lunary version 1.2.13, an insufficient granularity of access control vulnerability allows users to create, update, get, and delete prompt variations for datasets not owned by their organization. This issue arises due to the application n...

Exploit
  • EPSS 0.15%
  • Veröffentlicht 08.06.2024 20:15:52
  • Zuletzt bearbeitet 21.11.2024 09:42:16

In lunary-ai/lunary version v1.2.13, an incorrect authorization vulnerability exists that allows unauthorized users to access and manipulate projects within an organization they should not have access to. Specifically, the vulnerability is located in...

Exploit
  • EPSS 0.39%
  • Veröffentlicht 06.06.2024 19:16:08
  • Zuletzt bearbeitet 21.11.2024 09:47:45

A Cross-site Scripting (XSS) vulnerability exists in the SAML metadata endpoint `/auth/saml/${org?.id}/metadata` of lunary-ai/lunary version 1.2.7. The vulnerability arises due to the application's failure to escape or validate the `orgId` parameter ...

Exploit
  • EPSS 0.2%
  • Veröffentlicht 06.06.2024 19:16:08
  • Zuletzt bearbeitet 21.11.2024 09:47:25

A Server-Side Request Forgery (SSRF) vulnerability exists in the lunary-ai/lunary application, specifically within the endpoint '/auth/saml/tto/download-idp-xml'. The vulnerability arises due to the application's failure to validate user-supplied URL...

Exploit
  • EPSS 0.26%
  • Veröffentlicht 06.06.2024 19:16:06
  • Zuletzt bearbeitet 21.11.2024 09:47:16

In lunary-ai/lunary version 1.2.5, an improper access control vulnerability exists due to a missing permission check in the `GET /v1/users/me/org` endpoint. The platform's role definitions restrict the `Prompt Editor` role to prompt management and pr...

Exploit
  • EPSS 0.24%
  • Veröffentlicht 06.06.2024 19:16:05
  • Zuletzt bearbeitet 21.11.2024 09:47:02

In lunary-ai/lunary version 1.2.4, an account takeover vulnerability exists due to the exposure of password recovery tokens in API responses. Specifically, when a user initiates the password reset process, the recovery token is included in the respon...

Exploit
  • EPSS 0.22%
  • Veröffentlicht 06.06.2024 19:16:05
  • Zuletzt bearbeitet 21.11.2024 09:47:02

An Improper Access Control vulnerability exists in the lunary-ai/lunary repository, affecting versions up to and including 1.2.2. The vulnerability allows unauthorized users to view any prompts in any projects by supplying a specific prompt ID to an ...