Vulnerability Description
In lunary-ai/lunary versions 1.2.2 through 1.2.25, an improper access control vulnerability allows users on the Free plan to invite other members and assign them any role, including those intended for Paid and Enterprise plans only. This issue arises due to insufficient backend validation of roles and permissions, enabling unauthorized users to join a project and potentially exploit roles and permissions not intended for their use. The vulnerability specifically affects the Team feature, where the backend fails to validate whether a user has paid for a plan before allowing them to send invite links with any role assigned. This could lead to unauthorized access and manipulation of project settings or data.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Lunary | Lunary | >= 1.2.2, < 1.2.25 |
Related Weaknesses (CWE)
References
- https://github.com/lunary-ai/lunary/commit/b7bd3a830a0f47ba07d0fd57bf78c4dd8a216Patch
- https://huntr.com/bounties/719a5db3-f943-4100-a660-011cadf1bb32ExploitThird Party Advisory
- https://github.com/lunary-ai/lunary/commit/b7bd3a830a0f47ba07d0fd57bf78c4dd8a216Patch
- https://huntr.com/bounties/719a5db3-f943-4100-a660-011cadf1bb32ExploitThird Party Advisory
FAQ
What is CVE-2024-5127?
CVE-2024-5127 is a vulnerability with a CVSS score of 5.4 (MEDIUM). In lunary-ai/lunary versions 1.2.2 through 1.2.25, an improper access control vulnerability allows users on the Free plan to invite other members and assign them any role, including those intended for...
How severe is CVE-2024-5127?
CVE-2024-5127 has been rated MEDIUM with a CVSS base score of 5.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-5127?
Check the references section above for vendor advisories and patch information. Affected products include: Lunary Lunary.