Skip to content

[GHSA-6p2q-8qfq-wq7x] Lunary improper access control vulnerability #5740

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Conversation

hughcrt
Copy link

@hughcrt hughcrt commented Jun 20, 2025

Updates

  • Affected products
  • CVSS v3

Comments
The NPM package is not tied to this repo. This vulnerability concerns the main repo, not the NPM compagnon package.

@Copilot Copilot AI review requested due to automatic review settings June 20, 2025 18:19
Copy link

@Copilot Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull Request Overview

This PR updates the advisory JSON for the Lunary vulnerability, primarily reflecting changes in the vulnerability scoring data.

  • The "modified" timestamp has been updated.
  • The CVSS_V3 scoring block has been removed in favor of CVSS_V4.
Comments suppressed due to low confidence (2)

advisories/github-reviewed/2024/09/GHSA-6p2q-8qfq-wq7x/GHSA-6p2q-8qfq-wq7x.json:4

  • The updated 'modified' timestamp is a minor change; ensure that this update is consistent with audit logs and does not conflict with historical timestamp tracking.
  "modified": "2024-11-18T16:27:14Z",

advisories/github-reviewed/2024/09/GHSA-6p2q-8qfq-wq7x/GHSA-6p2q-8qfq-wq7x.json:10

  • The removal of the CVSS_V3 block indicates a shift to using only CVSS_V4. Ensure that all consumers of this advisory have been updated to support the new scoring system.
  "details": "An improper access control vulnerability exists in lunary-ai/lunary prior to commit 844e8855c7a713dc7371766dba4125de4007b1cf on the main branch. The vulnerability allows an attacker to use the auth tokens issued by the 'invite user' functionality to obtain valid JWT tokens. These tokens can be used to compromise target users upon registration for their own arbitrary organizations. The attacker can invite a target email, obtain a one-time use token, retract the invite, and later use the token to reset the password of the target user, leading to full account takeover.",

@github-actions github-actions bot changed the base branch from main to hughcrt/advisory-improvement-5740 June 20, 2025 18:20
@advisory-database advisory-database bot merged commit 0554bf3 into hughcrt/advisory-improvement-5740 Jun 20, 2025
4 checks passed
@advisory-database
Copy link
Contributor

Hi @hughcrt! Thank you so much for contributing to the GitHub Advisory Database. This database is free, open, and accessible to all, and it's people like you who make it great. Thanks for choosing to help others. We hope you send in more contributions in the future!

@advisory-database advisory-database bot deleted the hughcrt-GHSA-6p2q-8qfq-wq7x branch June 20, 2025 20:01
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant