CVE-2024-52294

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-52294
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-52294.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-52294
Aliases
Related
Published
2024-12-30T17:15:09Z
Modified
2025-01-15T05:16:21.977449Z
Summary
[none]
Details

Khoj is a self-hostable artificial intelligence app. Prior to version 1.29.10, an Insecure Direct Object Reference (IDOR) vulnerability in the update_subscription endpoint allows any authenticated user to manipulate other users' Stripe subscriptions by simply modifying the email parameter in the request. The vulnerability exists in the subscription endpoint at /api/subscription. The endpoint uses an email parameter as a direct reference to user subscriptions without verifying object ownership. While authentication is required, there is no authorization check to verify if the authenticated user owns the referenced subscription. The issue was fixed in version 1.29.10. Support for arbitrarily presenting an email for update has been deprecated.

References

Affected packages

Git / github.com/khoj-ai/khoj

Affected ranges

Type
GIT
Repo
https://github.com/khoj-ai/khoj
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

0.*

0.10.0
0.10.1
0.11.0
0.11.1
0.11.2
0.11.3
0.11.4
0.12.0
0.12.1
0.12.2
0.12.3
0.13.0
0.14.0
0.2.1
0.2.5
0.2.6
0.3.0
0.4.0
0.5.0
0.6.0
0.6.1
0.6.2
0.7.0
0.7.1
0.8.0
0.8.1
0.8.2
0.9.0

1.*

1.0.0
1.0.1
1.1.0
1.10.0
1.10.1
1.10.2
1.11.0
1.11.1
1.11.2
1.12.0
1.12.1
1.13.0
1.14.0
1.15.0
1.16.0
1.17.0
1.2.0
1.2.1
1.20.0
1.20.1
1.20.2
1.20.3
1.20.4
1.21.0
1.21.1
1.21.2
1.21.3
1.21.4
1.21.5
1.21.6
1.22.0
1.22.1
1.22.2
1.22.3
1.23.0
1.23.1
1.23.2
1.23.3
1.24.0
1.24.1
1.25.0
1.26.0
1.26.1
1.26.2
1.26.3
1.26.4
1.27.0
1.27.1
1.28.0
1.28.1
1.28.2
1.28.3
1.3.0
1.4.0
1.5.0
1.5.1
1.6.0
1.6.1
1.7.0
1.8.0
1.9.0

Other

rm

v0.*

v0.1.5-alpha
v0.1.6
v0.1.7
v0.1.8
v0.1.9
v0.2.0