Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-5277— Weak Password Recovery Mechanism in lunary-ai/lunary

EPSS 0.14% · P33
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2024-5277

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Weak Password Recovery Mechanism in lunary-ai/lunary
Source: NVD (National Vulnerability Database)
Vulnerability Description
In lunary-ai/lunary version 1.2.4, a vulnerability exists in the password recovery mechanism where the reset password token is not invalidated after use. This allows an attacker who compromises the recovery token to repeatedly change the password of a victim's account. The issue lies in the backend's handling of the reset password process, where the token, once used, is not discarded or invalidated, enabling its reuse. This vulnerability could lead to unauthorized account access if an attacker obtains the recovery token.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
忘记口令恢复机制弱
Source: NVD (National Vulnerability Database)
Vulnerability Title
Lunary 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Lunary是lunary开源的一个 LLM 的生产工具包。 Lunary 1.2.4版本存在安全漏洞,该漏洞源于密码恢复机制中存在重置密码令牌在使用后不会失效的问题,导致攻击者通过破解恢复令牌反复更改受害者帐户的密码。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
lunary-ailunary-ai/lunary unspecified ~ latest -

II. Public POCs for CVE-2024-5277

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2024-5277

登录查看更多情报信息。

Same Patch Batch · lunary-ai · 2024-06-06 · 12 CVEs total

CVE-2024-5126Improper Access Control in lunary-ai/lunary
CVE-2024-5131Improper Access Control in lunary-ai/lunary
CVE-2024-5133Account Takeover via Exposed Recovery Token in lunary-ai/lunary
CVE-2024-5248Improper Access Control in lunary-ai/lunary
CVE-2024-5127Improper Access Control in lunary-ai/lunary
CVE-2024-5130Incorrect Authorization in lunary-ai/lunary
CVE-2024-5328SSRF Vulnerability in lunary-ai/lunary
CVE-2024-5129Privilege Escalation Vulnerability in lunary-ai/lunary
CVE-2024-5478Cross-site Scripting (XSS) in SAML metadata endpoint in lunary-ai/lunary
CVE-2024-5128IDOR Vulnerability in lunary-ai/lunary
CVE-2024-3504Improper Access Control in lunary-ai/lunary

IV. Related Vulnerabilities

V. Comments for CVE-2024-5277

No comments yet


Leave a comment