CVE-2024-7475

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-7475
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-7475.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-7475
Published
2024-10-29T13:15:09.737Z
Modified
2025-11-19T17:35:19.764057Z
Severity
  • 9.1 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N CVSS Calculator
Summary
[none]
Details

An improper access control vulnerability in lunary-ai/lunary version 1.3.2 allows an attacker to update the SAML configuration without authorization. This vulnerability can lead to manipulation of authentication processes, fraudulent login requests, and theft of user information. Appropriate access controls should be implemented to ensure that the SAML configuration can only be updated by authorized users.

References

Affected packages

Git / github.com/lunary-ai/lunary

Affected ranges

Type
GIT
Repo
https://github.com/lunary-ai/lunary
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed