First published: Tue Apr 16 2024(Updated: )
An Insecure Direct Object Reference (IDOR) vulnerability exists in the lunary-ai/lunary repository, version 0.3.0, within the project update endpoint. The vulnerability allows authenticated users to modify the name of any project within the system without proper authorization checks, by directly referencing the project's ID in the PATCH request to the '/v1/projects/:projectId' endpoint. This issue arises because the endpoint does not verify if the provided project ID belongs to the currently authenticated user, enabling unauthorized modifications across different organizational projects.
Credit: security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
<1.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-1626 is considered high due to its potential for unauthorized data manipulation.
To fix CVE-2024-1626, ensure that proper authorization checks are implemented on project update endpoints.
CVE-2024-1626 affects authenticated users of the lunary-ai/lunary repository version 0.3.0 up to, but not including, 1.0.0.
CVE-2024-1626 is classified as an Insecure Direct Object Reference (IDOR) vulnerability.
CVE-2024-1626 allows authenticated users to modify the names of any projects without proper authorization.