In lunary-ai/lunary versions <=v1.2.11, an attacker can bypass email validation by using a dot character ('.') in the email address. This allows the creation of multiple accounts with essentially the same email address (e.g., 'attacker123@gmail.com' and 'attacker.123@gmail.com'), leading to incorrect synchronization and potential security issues.
History

Thu, 19 Sep 2024 16:15:00 +0000

Type Values Removed Values Added
First Time appeared Lunary
Lunary lunary
Weaknesses NVD-CWE-Other
CPEs cpe:2.3:a:lunary:lunary:*:*:*:*:*:*:*:*
Vendors & Products Lunary
Lunary lunary
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: @huntr_ai

Published: 2024-06-27T18:45:48.607Z

Updated: 2024-08-01T21:18:07.033Z

Reserved: 2024-06-07T17:02:33.877Z

Link: CVE-2024-5755

cve-icon Vulnrichment

Updated: 2024-08-01T21:18:07.033Z

cve-icon NVD

Status : Analyzed

Published: 2024-06-27T19:15:16.400

Modified: 2024-09-19T15:49:40.417

Link: CVE-2024-5755

cve-icon Redhat

No data.