HomeLunaryCVE-2024-8765

CVE-2024-8765

HIGH
7.3CVSS
Published: 2025-03-20
Updated: 2025-07-02
AI Analysis

Description

In lunary-ai/lunary, the privilege check mechanism is flawed in version git afc5df4. The system incorrectly identifies certain endpoints as public if the path contains '/auth/' anywhere within it. This allows unauthenticated attackers to access sensitive endpoints by including '/auth/' in the path. As a result, attackers can obtain and modify sensitive data and utilize other organizations' resources without proper authentication.

CVSS Metrics

Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Attack Vector
network
Complexity
low
Privileges
none
User Action
none
Scope
unchanged
Confidentiality
low
Integrity
low
Availability
low
Weaknesses
CWE-41

Metadata

Primary Vendor
LUNARY
Published
3/20/2025
Last Modified
7/2/2025
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

lunary : lunary

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2024-8765 | HIGH Severity | CVEDatabase.com | CVEDatabase.com