Subscriptions
Tracking
Sign in to view the affected projects.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 06 Nov 2024 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Lunary
Lunary lunary |
|
| CPEs | cpe:2.3:a:lunary:lunary:1.4.2:*:*:*:*:*:*:* | |
| Vendors & Products |
Lunary
Lunary lunary |
|
| Metrics |
cvssV3_1
|
Fri, 01 Nov 2024 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Lunary-ai
Lunary-ai lunary-ai\/lunary |
|
| CPEs | cpe:2.3:a:lunary-ai:lunary-ai\/lunary:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Lunary-ai
Lunary-ai lunary-ai\/lunary |
|
| Metrics |
ssvc
|
Fri, 01 Nov 2024 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A SQL injection vulnerability exists in the `/api/v1/external-users` route of lunary-ai/lunary version v1.4.2. The `order by` clause of the SQL query uses `sql.unsafe` without prior sanitization, allowing for SQL injection. The `orderByClause` variable is constructed without server-side validation or sanitization, enabling an attacker to execute arbitrary SQL commands. Successful exploitation can lead to complete data loss, modification, or corruption. | |
| Title | SQL Injection in lunary-ai/lunary | |
| Weaknesses | CWE-89 | |
| References |
| |
| Metrics |
cvssV3_0
|
Status: PUBLISHED
Assigner: @huntr_ai
Published:
Updated: 2024-11-01T13:19:19.973Z
Reserved: 2024-08-03T21:42:38.864Z
Link: CVE-2024-7456
Updated: 2024-11-01T13:19:14.317Z
Status : Analyzed
Published: 2024-11-01T12:15:03.557
Modified: 2024-11-06T15:45:58.993
Link: CVE-2024-7456
No data.
OpenCVE Enrichment
No data.