CVE-2024-6862: Lunary Cross-Site Request Forgery (CSRF) vulnerability
7.4
CVSS Score
3.0
Basic Information
CVE ID
GHSA ID
EPSS Score
0.21346%
CWE
Published
9/13/2024
Updated
9/13/2024
KEV Status
No
Technology
JavaScript
Technical Details
CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| lunary | npm | < 1.4.10 | 1.4.10 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from the CORS middleware implementation in patchedCors function. The pre-patch version: 1) Used client-supplied Origin header without validation (allowing '*' fallback) 2) Applied this permissive policy to OPTIONS requests and general CORS configuration 3) Lacked environment-specific restrictions (only fixed in production after patch). The commit shows these flaws were addressed by introducing environment checks (NODE_ENV) and using a fixed APP_URL in production rather than client-controlled values.