Логотип exploitDog
bind:CVE-2024-5277
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-5277

Количество 3

Количество 3

nvd логотип

CVE-2024-5277

больше 1 года назад

In lunary-ai/lunary version 1.2.4, a vulnerability exists in the password recovery mechanism where the reset password token is not invalidated after use. This allows an attacker who compromises the recovery token to repeatedly change the password of a victim's account. The issue lies in the backend's handling of the reset password process, where the token, once used, is not discarded or invalidated, enabling its reuse. This vulnerability could lead to unauthorized account access if an attacker obtains the recovery token.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-jjfr-89c6-m7cf

больше 1 года назад

In lunary-ai/lunary version 1.2.4, a vulnerability exists in the password recovery mechanism where the reset password token is not invalidated after use. This allows an attacker who compromises the recovery token to repeatedly change the password of a victim's account. The issue lies in the backend's handling of the reset password process, where the token, once used, is not discarded or invalidated, enabling its reuse. This vulnerability could lead to unauthorized account access if an attacker obtains the recovery token.

CVSS3: 6.4
EPSS: Низкий
fstec логотип

BDU:2024-04403

почти 2 года назад

Уязвимость платформы для мониторинга, управления и улучшения приложений LLM Lunary, связанная с недостатком механизма восстановления пароля, позволяющая нарушителю использовать токен восстановления для многократной смены пароля пользователя

CVSS3: 6.4
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-5277

In lunary-ai/lunary version 1.2.4, a vulnerability exists in the password recovery mechanism where the reset password token is not invalidated after use. This allows an attacker who compromises the recovery token to repeatedly change the password of a victim's account. The issue lies in the backend's handling of the reset password process, where the token, once used, is not discarded or invalidated, enabling its reuse. This vulnerability could lead to unauthorized account access if an attacker obtains the recovery token.

CVSS3: 7.5
0%
Низкий
больше 1 года назад
github логотип
GHSA-jjfr-89c6-m7cf

In lunary-ai/lunary version 1.2.4, a vulnerability exists in the password recovery mechanism where the reset password token is not invalidated after use. This allows an attacker who compromises the recovery token to repeatedly change the password of a victim's account. The issue lies in the backend's handling of the reset password process, where the token, once used, is not discarded or invalidated, enabling its reuse. This vulnerability could lead to unauthorized account access if an attacker obtains the recovery token.

CVSS3: 6.4
0%
Низкий
больше 1 года назад
fstec логотип
BDU:2024-04403

Уязвимость платформы для мониторинга, управления и улучшения приложений LLM Lunary, связанная с недостатком механизма восстановления пароля, позволяющая нарушителю использовать токен восстановления для многократной смены пароля пользователя

CVSS3: 6.4
0%
Низкий
почти 2 года назад

Уязвимостей на страницу