CVE-2024-5127

Source
https://cve.org/CVERecord?id=CVE-2024-5127
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-5127.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-5127
Published
2024-06-06T18:15:19Z
Modified
2026-03-14T12:36:26.418271Z
Severity
  • 5.4 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

In lunary-ai/lunary versions 1.2.2 through 1.2.25, an improper access control vulnerability allows users on the Free plan to invite other members and assign them any role, including those intended for Paid and Enterprise plans only. This issue arises due to insufficient backend validation of roles and permissions, enabling unauthorized users to join a project and potentially exploit roles and permissions not intended for their use. The vulnerability specifically affects the Team feature, where the backend fails to validate whether a user has paid for a plan before allowing them to send invite links with any role assigned. This could lead to unauthorized access and manipulation of project settings or data.

References

Affected packages

Git /

Affected ranges

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-5127.json"
unresolved_ranges
[
    {
        "events": [
            {
                "introduced": "1.2.2"
            },
            {
                "fixed": "1.2.25"
            }
        ]
    }
]