CVE-2024-1902

See a problem?
Source
https://nvd.nist.gov/vuln/detail/CVE-2024-1902
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-1902.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-1902
Published
2024-04-10T17:15:53Z
Modified
2024-10-08T03:59:34.347340Z
Summary
[none]
Details

lunary-ai/lunary is vulnerable to a session reuse attack, allowing a removed user to change the organization name without proper authorization. The vulnerability stems from the lack of validation to check if a user is still part of an organization before allowing them to make changes. An attacker can exploit this by using an old authorization token to send a PATCH request, modifying the organization's name even after being removed from the organization. This issue is due to incorrect synchronization and affects the orgs.patch route.

References

Affected packages

Git / github.com/lunary-ai/lunary

Affected ranges

Type
GIT
Repo
https://github.com/lunary-ai/lunary
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

1.*

1.2.4

v0.*

v0.1.0
v0.1.1
v0.1.2
v0.1.3
v0.1.4
v0.1.5
v0.2.0
v0.2.1
v0.3.0
v0.3.1

v1.*

v1.0.0
v1.0.1
v1.0.2
v1.1.0
v1.2.0
v1.2.1
v1.2.2
v1.2.3
v1.2.5
v1.2.6
v1.2.7