HomeLunaryCVE-2024-5328

CVE-2024-5328

CRITICAL
9.3CVSS
Published: 2024-06-06
Updated: 2024-11-21
AI Analysis

Description

A Server-Side Request Forgery (SSRF) vulnerability exists in the lunary-ai/lunary application, specifically within the endpoint '/auth/saml/tto/download-idp-xml'. The vulnerability arises due to the application's failure to validate user-supplied URLs before using them in server-side requests. An attacker can exploit this vulnerability by sending a specially crafted request to the affected endpoint, allowing them to make unauthorized requests to internal or external resources. This could lead to the disclosure of sensitive information, service disruption, or further attacks against the network infrastructure. The issue affects the latest version of the application as of the report.

CVSS Metrics

Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L
Attack Vector
network
Complexity
low
Privileges
none
User Action
none
Scope
changed
Confidentiality
high
Integrity
none
Availability
low
Weaknesses
CWE-918

Metadata

Primary Vendor
LUNARY
Published
6/6/2024
Last Modified
11/21/2024
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

lunary : lunary

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2024-5328 | CRITICAL Severity | CVEDatabase.com | CVEDatabase.com