Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 06 Nov 2024 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Lunary
Lunary lunary |
|
| CPEs | cpe:2.3:a:lunary:lunary:1.4.2:*:*:*:*:*:*:* | |
| Vendors & Products |
Lunary
Lunary lunary |
|
| Metrics |
cvssV3_1
|
Fri, 01 Nov 2024 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Lunary-ai
Lunary-ai lunary-ai\/lunary |
|
| CPEs | cpe:2.3:a:lunary-ai:lunary-ai\/lunary:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Lunary-ai
Lunary-ai lunary-ai\/lunary |
|
| Metrics |
ssvc
|
Fri, 01 Nov 2024 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A SQL injection vulnerability exists in the `/api/v1/external-users` route of lunary-ai/lunary version v1.4.2. The `order by` clause of the SQL query uses `sql.unsafe` without prior sanitization, allowing for SQL injection. The `orderByClause` variable is constructed without server-side validation or sanitization, enabling an attacker to execute arbitrary SQL commands. Successful exploitation can lead to complete data loss, modification, or corruption. | |
| Title | SQL Injection in lunary-ai/lunary | |
| Weaknesses | CWE-89 | |
| References |
| |
| Metrics |
cvssV3_0
|
Status: PUBLISHED
Assigner: @huntr_ai
Published:
Updated: 2024-11-01T13:19:19.973Z
Reserved: 2024-08-03T21:42:38.864Z
Link: CVE-2024-7456
Updated: 2024-11-01T13:19:14.317Z
Status : Analyzed
Published: 2024-11-01T12:15:03.557
Modified: 2024-11-06T15:45:58.993
Link: CVE-2024-7456
No data.
OpenCVE Enrichment
No data.