Vulnerability Description
A SQL injection vulnerability exists in the `/api/v1/external-users` route of lunary-ai/lunary version v1.4.2. The `order by` clause of the SQL query uses `sql.unsafe` without prior sanitization, allowing for SQL injection. The `orderByClause` variable is constructed without server-side validation or sanitization, enabling an attacker to execute arbitrary SQL commands. Successful exploitation can lead to complete data loss, modification, or corruption.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Lunary | Lunary | 1.4.2 |
Related Weaknesses (CWE)
References
- https://github.com/lunary-ai/lunary/commit/6a0bc201181e0f4a0cc375ccf4ef0d7ae65c8Product
- https://huntr.com/bounties/bfb3015e-5642-4d94-ab49-e8b49c4e07e4ExploitThird Party Advisory
FAQ
What is CVE-2024-7456?
CVE-2024-7456 is a vulnerability with a CVSS score of 9.8 (CRITICAL). A SQL injection vulnerability exists in the `/api/v1/external-users` route of lunary-ai/lunary version v1.4.2. The `order by` clause of the SQL query uses `sql.unsafe` without prior sanitization, allo...
How severe is CVE-2024-7456?
CVE-2024-7456 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2024-7456?
Check the references section above for vendor advisories and patch information. Affected products include: Lunary Lunary.