First published: Thu Nov 14 2024(Updated: )
In lunary-ai/lunary versions up to and including 1.2.5, an information disclosure vulnerability exists where account recovery hashes of users are inadvertently exposed to unauthorized actors. This issue occurs when authenticated users inspect responses from `GET /v1/users/me` and `GET /v1/users/me/org` endpoints. The exposed account recovery hashes, while not directly related to user passwords, represent sensitive information that should not be accessible to unauthorized parties. Exposing these hashes could potentially facilitate account recovery attacks or other malicious activities. The vulnerability was addressed in version 1.2.6.
Credit: security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
lunary lunary | <1.2.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-3502 is classified as an information disclosure vulnerability, which can potentially expose sensitive user account recovery data.
To fix CVE-2024-3502, upgrade your lunary installation to version 1.2.6 or later.
CVE-2024-3502 affects users of lunary-ai/lunary versions up to and including 1.2.5.
CVE-2024-3502 is an information disclosure vulnerability that allows unauthorized access to account recovery hashes.
CVE-2024-3502 was disclosed as a vulnerability in lunary-ai/lunary, affecting specific versions prior to the security fix.