First published: Fri Sep 13 2024(Updated: )
# Withdrawn Advisory This advisory was incorrectly linked the the npm package `lunary`. The advisory is valid, but not for that package. # Original Advisory A broken access control vulnerability exists prior to commit 1f043d8798ad87346dfe378eea723bff78ad7433 of lunary-ai/lunary. The `saml.ts` file allows a user from one organization to update the Identity Provider (IDP) settings and view the SSO metadata of another organization. This vulnerability can lead to unauthorized access and potential account takeover if the email of a user in the target organization is known.
Credit: security@huntr.dev security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
npm/lunary | <1.4.9 | 1.4.9 |
lunary lunary | <1.4.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-6582 is categorized as a broken access control vulnerability.
To fix CVE-2024-6582, update the lunary package to version 1.4.9 or later.
Versions of lunary prior to 1.4.9 are affected by CVE-2024-6582.
Yes, CVE-2024-6582 is associated with the npm package lunary.
CVE-2024-6582 involves broken access control, which can potentially allow unauthorized access within the affected software.