First published: Wed Apr 10 2024(Updated: )
An Insecure Direct Object Reference (IDOR) vulnerability exists in the lunary-ai/lunary application version 0.3.0, allowing unauthorized deletion of any organization's project. The vulnerability is due to insufficient authorization checks in the project deletion endpoint, where the endpoint fails to verify if the project ID provided in the request belongs to the requesting user's organization. As a result, an attacker can delete projects belonging to any organization by sending a crafted DELETE request with the target project's ID. This issue affects the project deletion functionality implemented in the projects.delete route.
Credit: security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
lunary lunary | =0.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The CVE-2024-1625 vulnerability is considered to have a high severity due to the potential for unauthorized project deletion.
To fix CVE-2024-1625, implement proper authorization checks in the project deletion endpoint of the lunary application.
CVE-2024-1625 affects users of the lunary application version 0.3.0.
In the context of CVE-2024-1625, an IDOR vulnerability allows attackers to access or manipulate data they should not have permission to, such as deleting projects.
Failure to address CVE-2024-1625 could lead to significant data loss as unauthorized users could delete any organization's projects.