Skip to content

lunary-ai/lunary Access Control Vulnerability in Prompt Variation Management

Critical severity GitHub Reviewed Published Jun 10, 2024 to the GitHub Advisory Database • Updated Jun 12, 2024

Package

pip lunary (pip)

Affected versions

< 1.2.13

Patched versions

None

Description

In lunary-ai/lunary version 1.2.13, an insufficient granularity of access control vulnerability allows users to create, update, get, and delete prompt variations for datasets not owned by their organization. This issue arises due to the application not properly validating the ownership of dataset prompts and their variations against the organization or project of the requesting user. As a result, unauthorized modifications to dataset prompts can occur, leading to altered or removed dataset prompts without proper authorization. This vulnerability impacts the integrity and consistency of dataset information, potentially affecting the results of experiments.

References

Published by the National Vulnerability Database Jun 9, 2024
Published to the GitHub Advisory Database Jun 10, 2024
Reviewed Jun 10, 2024
Last updated Jun 12, 2024

Severity

Critical
9.3
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
None
User interaction
Required
Scope
Changed
Confidentiality
High
Integrity
High
Availability
None
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N

Weaknesses

CVE ID

CVE-2024-5389

GHSA ID

GHSA-3mwc-2cj7-gx8c

Source code

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.