Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS05am1wLWo2M2ctOHg2bc4AA_iQ
Lunary information disclosure vulnerability
An information disclosure vulnerability exists in the lunary-ai/lunary, specifically in the runs/{run_id}/related
endpoint. This endpoint does not verify that the user has the necessary access rights to the run(s) they are accessing. As a result, it returns not only the specified run but also all runs that have the run_id
listed as their parent run. This issue affects the main branch, commit a761d833. The vulnerability allows unauthorized users to obtain information about non-public runs and their related runs, given the run_id
of a public or non-public run.
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS05am1wLWo2M2ctOHg2bc4AA_iQ
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: 2 months ago
Updated: 2 months ago
CVSS Score: 4.3
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Identifiers: GHSA-9jmp-j63g-8x6m, CVE-2024-6867
References:
- https://nvd.nist.gov/vuln/detail/CVE-2024-6867
- https://github.com/lunary-ai/lunary/commit/35afd4439464571eb016318cd7b6f85a162225ca
- https://huntr.com/bounties/460df515-164c-4435-954b-0233a181545f
- https://github.com/advisories/GHSA-9jmp-j63g-8x6m
Blast Radius: 1.0
Affected Packages
npm:lunary
Dependent packages: 0Dependent repositories: 0
Downloads: 23,377 last month
Affected Version Ranges: < 1.4.10
Fixed in: 1.4.10
All affected versions: 0.6.2, 0.6.3, 0.6.4, 0.6.5, 0.6.6, 0.6.7, 0.6.8, 0.6.9, 0.6.10, 0.6.11, 0.6.12, 0.6.13, 0.6.15, 0.6.16, 0.7.0, 0.7.1, 0.7.2, 0.7.3, 0.7.4, 0.7.5, 0.7.6, 0.7.7, 0.7.8, 0.7.9, 0.7.10, 0.7.11, 0.7.12, 0.7.13, 0.7.14, 0.7.15
All unaffected versions: