Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-5129— Privilege Escalation Vulnerability in lunary-ai/lunary

EPSS 0.14% · P33
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2024-5129

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Privilege Escalation Vulnerability in lunary-ai/lunary
Source: NVD (National Vulnerability Database)
Vulnerability Description
A Privilege Escalation Vulnerability exists in lunary-ai/lunary version 1.2.2, where any user can delete any datasets due to missing authorization checks. The vulnerability is present in the dataset deletion functionality, where the application fails to verify if the user requesting the deletion has the appropriate permissions. This allows unauthorized users to send a DELETE request to the server and delete any dataset by specifying its ID. The issue is located in the datasets.delete function within the datasets index file.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
授权机制缺失
Source: NVD (National Vulnerability Database)
Vulnerability Title
Lunary 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Lunary是lunary开源的一个 LLM 的生产工具包。 Lunary 1.2.2版本存在安全漏洞,该漏洞源于缺少授权检查,存在权限提升漏洞,任何用户都可以删除任何数据集。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
lunary-ailunary-ai/lunary unspecified ~ 1.2.8 -

II. Public POCs for CVE-2024-5129

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2024-5129

登录查看更多情报信息。

Same Patch Batch · lunary-ai · 2024-06-06 · 12 CVEs total

CVE-2024-5126Improper Access Control in lunary-ai/lunary
CVE-2024-5277Weak Password Recovery Mechanism in lunary-ai/lunary
CVE-2024-5131Improper Access Control in lunary-ai/lunary
CVE-2024-5133Account Takeover via Exposed Recovery Token in lunary-ai/lunary
CVE-2024-5248Improper Access Control in lunary-ai/lunary
CVE-2024-5127Improper Access Control in lunary-ai/lunary
CVE-2024-5130Incorrect Authorization in lunary-ai/lunary
CVE-2024-5328SSRF Vulnerability in lunary-ai/lunary
CVE-2024-5478Cross-site Scripting (XSS) in SAML metadata endpoint in lunary-ai/lunary
CVE-2024-5128IDOR Vulnerability in lunary-ai/lunary
CVE-2024-3504Improper Access Control in lunary-ai/lunary

IV. Related Vulnerabilities

V. Comments for CVE-2024-5129

No comments yet


Leave a comment