CVE-2024-1902

lunary-ai/lunary is vulnerable to a session reuse attack, allowing a removed user to change the organization name without proper authorization. The vulnerability stems from the lack of validation to check if a user is still part of an organization before allowing them to make changes. An attacker can exploit this by using an old authorization token to send a PATCH request, modifying the organization's name even after being removed from the organization. This issue is due to incorrect synchronization and affects the orgs.patch route.
Configurations

No configuration.

History

15 Apr 2024, 18:15

Type Values Removed Values Added
References
  • () https://github.com/lunary-ai/lunary/commit/d8e2e73efd53ab4e92cf47bbf4b639a9f08853d2 -

10 Apr 2024, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-04-10 17:15

Updated : 2024-04-15 18:15


NVD link : CVE-2024-1902

Mitre link : CVE-2024-1902

CVE.ORG link : CVE-2024-1902


JSON object : View

Products Affected

No product.

CWE
CWE-821

Incorrect Synchronization