First published: Tue Apr 16 2024(Updated: )
An incorrect authorization vulnerability exists in the lunary-ai/lunary repository, specifically within the evaluations.get route in the evaluations API endpoint. This vulnerability allows unauthorized users to retrieve the results of any organization's evaluation by simply knowing the evaluation ID, due to the lack of project ID verification in the SQL query. As a result, attackers can gain access to potentially private data contained within the evaluation results.
Credit: security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
lunary lunary | <1.2.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-1738 has a high severity rating due to its potential for unauthorized access to sensitive evaluation results.
To fix CVE-2024-1738, ensure proper authorization checks are implemented in the evaluations.get route of the evaluations API endpoint.
CVE-2024-1738 affects versions of the lunary software prior to 1.2.4.
Any unauthorized user with knowledge of the evaluations API endpoint can exploit CVE-2024-1738 to retrieve evaluation results.
The implications of CVE-2024-1738 for organizations include potential data breaches and loss of confidentiality regarding evaluation results.