CVE-2024-5389: lunary-ai/lunary Access Control Vulnerability in Prompt Variation Management
9.3
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.28941%
CWE
Published
6/10/2024
Updated
11/25/2024
KEV Status
No
Technology
JavaScript
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| lunary | npm | < 1.4.9 | 1.4.9 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from multiple CRUD handlers in the datasets API endpoint that failed to properly validate() project ownership through JOINs with the dataset table. The commit fixes show consistent pattern of adding 'd.project_id = ${projectId}' checks across all operations. Each vulnerable function corresponds to an API route that previously executed SQL queries without proper authorization context, allowing cross-organization dataset manipulation. The frontend changes are unrelated to the access control issue.