Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-v6wm-cwm9-2486

Опубликовано: 10 апр. 2024
Источник: github
Github: Не прошло ревью
CVSS3: 9.1

Описание

lunary-ai/lunary version 1.0.1 is vulnerable to improper authorization, allowing removed members to read, create, modify, and delete prompt templates using an old authorization token. Despite being removed from an organization, these members can still perform operations on prompt templates by sending HTTP requests with their previously captured authorization token. This issue exposes organizations to unauthorized access and manipulation of sensitive template data.

lunary-ai/lunary version 1.0.1 is vulnerable to improper authorization, allowing removed members to read, create, modify, and delete prompt templates using an old authorization token. Despite being removed from an organization, these members can still perform operations on prompt templates by sending HTTP requests with their previously captured authorization token. This issue exposes organizations to unauthorized access and manipulation of sensitive template data.

EPSS

Процентиль: 47%
0.00241
Низкий

9.1 Critical

CVSS3

Дефекты

CWE-285
CWE-863

Связанные уязвимости

CVSS3: 9.1
nvd
почти 2 года назад

lunary-ai/lunary version 1.0.1 is vulnerable to improper authorization, allowing removed members to read, create, modify, and delete prompt templates using an old authorization token. Despite being removed from an organization, these members can still perform operations on prompt templates by sending HTTP requests with their previously captured authorization token. This issue exposes organizations to unauthorized access and manipulation of sensitive template data.

EPSS

Процентиль: 47%
0.00241
Низкий

9.1 Critical

CVSS3

Дефекты

CWE-285
CWE-863