First published: Thu Jun 06 2024(Updated: )
In lunary-ai/lunary version 1.2.4, a vulnerability exists in the password recovery mechanism where the reset password token is not invalidated after use. This allows an attacker who compromises the recovery token to repeatedly change the password of a victim's account. The issue lies in the backend's handling of the reset password process, where the token, once used, is not discarded or invalidated, enabling its reuse. This vulnerability could lead to unauthorized account access if an attacker obtains the recovery token.
Credit: security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
lunary lunary | <1.4.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-5277 is classified as a high-severity vulnerability due to its potential for account takeover.
To fix CVE-2024-5277, ensure that the password recovery mechanism invalidates the reset token after it has been used.
CVE-2024-5277 affects Lunary version 1.2.4 up to but not including 1.4.9.
CVE-2024-5277 can be exploited through a replay attack where an attacker uses a compromised recovery token to change a victim's password repeatedly.
A temporary workaround for CVE-2024-5277 includes manually verifying user identity before allowing password resets until a patch is implemented.