CVE-2024-8765
LowVulnerability Description
In lunary-ai/lunary, the privilege check mechanism is flawed in version git afc5df4. The system incorrectly identifies certain endpoints as public if the path contains '/auth/' anywhere within it. This allows unauthenticated attackers to access sensitive endpoints by including '/auth/' in the path. As a result, attackers can obtain and modify sensitive data and utilize other organizations' resources without proper authentication.
Known Affected Software
84 configuration(s) from 1 vendor(s)
cpe:2.3:a:lunary:lunary:1.2.22:*:*:*:*:*:*:*
cpe:2.3:a:lunary:lunary:0.3.1:*:*:*:*:*:*:*
cpe:2.3:a:lunary:lunary:1.2.19:*:*:*:*:*:*:*
cpe:2.3:a:lunary:lunary:1.3.4:-:*:*:*:*:*:*
cpe:2.3:a:lunary:lunary:1.3.7:*:*:*:*:*:*:*
cpe:2.3:a:lunary:lunary:1.2.15:*:*:*:*:*:*:*
cpe:2.3:a:lunary:lunary:1.4.10:*:*:*:*:*:*:*
cpe:2.3:a:lunary:lunary:1.2.30:*:*:*:*:*:*:*
cpe:2.3:a:lunary:lunary:1.2.28:*:*:*:*:*:*:*
cpe:2.3:a:lunary:lunary:1.4.4:*:*:*:*:*:*:*
cpe:2.3:a:lunary:lunary:0.2.1:*:*:*:*:*:*:*
cpe:2.3:a:lunary:lunary:1.3.3:*:*:*:*:*:*:*
cpe:2.3:a:lunary:lunary:1.2.0:*:*:*:*:*:*:*
cpe:2.3:a:lunary:lunary:0.1.3:*:*:*:*:*:*:*
cpe:2.3:a:lunary:lunary:1.2.29:*:*:*:*:*:*:*
cpe:2.3:a:lunary:lunary:1.2.7:*:*:*:*:*:*:*
cpe:2.3:a:lunary:lunary:1.2.23:*:*:*:*:*:*:*
cpe:2.3:a:lunary:lunary:1.2.2:*:*:*:*:*:*:*
cpe:2.3:a:lunary:lunary:1.2.5:*:*:*:*:*:*:*
cpe:2.3:a:lunary:lunary:1.2.9:*:*:*:*:*:*:*
cpe:2.3:a:lunary:lunary:1.3.10:*:*:*:*:*:*:*
cpe:2.3:a:lunary:lunary:1.3.6:*:*:*:*:*:*:*
cpe:2.3:a:lunary:lunary:0.1.0:*:*:*:*:*:*:*
cpe:2.3:a:lunary:lunary:1.4.19:*:*:*:*:*:*:*
cpe:2.3:a:lunary:lunary:1.2.13:*:*:*:*:*:*:*
cpe:2.3:a:lunary:lunary:1.4.12:*:*:*:*:*:*:*
cpe:2.3:a:lunary:lunary:0.1.5:*:*:*:*:*:*:*
cpe:2.3:a:lunary:lunary:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:lunary:lunary:1.2.17:*:*:*:*:*:*:*
cpe:2.3:a:lunary:lunary:1.4.15:*:*:*:*:*:*:*
cpe:2.3:a:lunary:lunary:1.4.22:*:*:*:*:*:*:*
cpe:2.3:a:lunary:lunary:0.1.4:*:*:*:*:*:*:*
cpe:2.3:a:lunary:lunary:1.3.2:*:*:*:*:*:*:*
cpe:2.3:a:lunary:lunary:1.2.11:*:*:*:*:*:*:*
cpe:2.3:a:lunary:lunary:1.2.34:*:*:*:*:*:*:*
cpe:2.3:a:lunary:lunary:1.1.0:*:*:*:*:*:*:*
cpe:2.3:a:lunary:lunary:1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:lunary:lunary:1.4.8:*:*:*:*:*:*:*
cpe:2.3:a:lunary:lunary:1.2.20:*:*:*:*:*:*:*
cpe:2.3:a:lunary:lunary:1.2.27:*:*:*:*:*:*:*
cpe:2.3:a:lunary:lunary:1.4.5:*:*:*:*:*:*:*
cpe:2.3:a:lunary:lunary:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:lunary:lunary:1.3.8:*:*:*:*:*:*:*
cpe:2.3:a:lunary:lunary:0.2.0:*:*:*:*:*:*:*
cpe:2.3:a:lunary:lunary:1.4.13:*:*:*:*:*:*:*
cpe:2.3:a:lunary:lunary:1.2.10:*:*:*:*:*:*:*
cpe:2.3:a:lunary:lunary:1.4.18:*:*:*:*:*:*:*
cpe:2.3:a:lunary:lunary:0.1.1:*:*:*:*:*:*:*
cpe:2.3:a:lunary:lunary:1.4.1:*:*:*:*:*:*:*
cpe:2.3:a:lunary:lunary:1.2.26:*:*:*:*:*:*:*
cpe:2.3:a:lunary:lunary:1.4.14:*:*:*:*:*:*:*
cpe:2.3:a:lunary:lunary:1.2.14:*:*:*:*:*:*:*
cpe:2.3:a:lunary:lunary:1.2.6:*:*:*:*:*:*:*
cpe:2.3:a:lunary:lunary:0.1.2:*:*:*:*:*:*:*
cpe:2.3:a:lunary:lunary:1.2.18:*:*:*:*:*:*:*
cpe:2.3:a:lunary:lunary:1.2.21:*:*:*:*:*:*:*
cpe:2.3:a:lunary:lunary:0.3.0:*:*:*:*:*:*:*
cpe:2.3:a:lunary:lunary:1.4.3:-:*:*:*:*:*:*
cpe:2.3:a:lunary:lunary:1.4.7:*:*:*:*:*:*:*
cpe:2.3:a:lunary:lunary:1.3.1:*:*:*:*:*:*:*
cpe:2.3:a:lunary:lunary:1.4.2:*:*:*:*:*:*:*
cpe:2.3:a:lunary:lunary:1.2.31:*:*:*:*:*:*:*
cpe:2.3:a:lunary:lunary:1.3.5:*:*:*:*:*:*:*
cpe:2.3:a:lunary:lunary:1.4.9:*:*:*:*:*:*:*
cpe:2.3:a:lunary:lunary:1.2.33:*:*:*:*:*:*:*
cpe:2.3:a:lunary:lunary:1.2.4:*:*:*:*:*:*:*
cpe:2.3:a:lunary:lunary:1.2.24:*:*:*:*:*:*:*
cpe:2.3:a:lunary:lunary:1.2.8:*:*:*:*:*:*:*
cpe:2.3:a:lunary:lunary:1.4.17:*:*:*:*:*:*:*
cpe:2.3:a:lunary:lunary:1.2.12:*:*:*:*:*:*:*
cpe:2.3:a:lunary:lunary:1.4.11:*:*:*:*:*:*:*
cpe:2.3:a:lunary:lunary:1.3.9:*:*:*:*:*:*:*
cpe:2.3:a:lunary:lunary:1.2.16:*:*:*:*:*:*:*
cpe:2.3:a:lunary:lunary:1.2.1:*:*:*:*:*:*:*
cpe:2.3:a:lunary:lunary:1.4.0:*:*:*:*:*:*:*
cpe:2.3:a:lunary:lunary:1.3.0:*:*:*:*:*:*:*
cpe:2.3:a:lunary:lunary:1.2.3:*:*:*:*:*:*:*
cpe:2.3:a:lunary:lunary:1.4.16:*:*:*:*:*:*:*
cpe:2.3:a:lunary:lunary:1.4.6:*:*:*:*:*:*:*
cpe:2.3:a:lunary:lunary:1.4.21:*:*:*:*:*:*:*
cpe:2.3:a:lunary:lunary:1.3.11:*:*:*:*:*:*:*
cpe:2.3:a:lunary:lunary:1.2.32:*:*:*:*:*:*:*
cpe:2.3:a:lunary:lunary:1.2.25:*:*:*:*:*:*:*
cpe:2.3:a:lunary:lunary:1.4.20:*:*:*:*:*:*:*
Severity Details
Weakness Type (CWE)
Improper Resolution of Path Equivalence
- Description
- The product is vulnerable to file system contents disclosure through path equivalence. Path equivalence involves the use of special characters in file and directory names. The associated manipulations are intended to generate multiple names for the same object.
- Typical Severity
- Medium
- Abstraction Level
- Base
Key Information
- Published Date
- March 20, 2025
External Resources
Related News Articles
Latest news and updates about CVE-2024-8765
