CVE-2024-5755

Source
https://cve.org/CVERecord?id=CVE-2024-5755
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-5755.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-5755
Withdrawn
2026-05-04T08:48:37.447463Z
Published
2024-06-27T19:15:16.400Z
Modified
2026-05-04T08:48:37.447463Z
Severity
  • 5.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N CVSS Calculator
Summary
[none]
Details

In lunary-ai/lunary versions <=v1.2.11, an attacker can bypass email validation by using a dot character ('.') in the email address. This allows the creation of multiple accounts with essentially the same email address (e.g., 'attacker123@gmail.com' and 'attacker.123@gmail.com'), leading to incorrect synchronization and potential security issues.

References

Affected packages

Git /

Affected ranges

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-5755.json"
unresolved_ranges
[
    {
        "events": [
            {
                "introduced": "0"
            },
            {
                "last_affected": "1.2.11"
            }
        ]
    }
]