A SQL injection vulnerability exists in the `/api/v1/external-users` route of lunary-ai/lunary version v1.4.2. The `order by` clause of the SQL query uses `sql.unsafe` without prior sanitization, allowing for SQL injection. The `orderByClause` variable is constructed without server-side validation or sanitization, enabling an attacker to execute arbitrary SQL commands. Successful exploitation can lead to complete data loss, modification, or corruption.
Metrics
Affected Vendors & Products
References
History
Wed, 06 Nov 2024 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Lunary
Lunary lunary |
|
CPEs | cpe:2.3:a:lunary:lunary:1.4.2:*:*:*:*:*:*:* | |
Vendors & Products |
Lunary
Lunary lunary |
|
Metrics |
cvssV3_1
|
Fri, 01 Nov 2024 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Lunary-ai
Lunary-ai lunary-ai\/lunary |
|
CPEs | cpe:2.3:a:lunary-ai:lunary-ai\/lunary:*:*:*:*:*:*:*:* | |
Vendors & Products |
Lunary-ai
Lunary-ai lunary-ai\/lunary |
|
Metrics |
ssvc
|
Fri, 01 Nov 2024 12:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A SQL injection vulnerability exists in the `/api/v1/external-users` route of lunary-ai/lunary version v1.4.2. The `order by` clause of the SQL query uses `sql.unsafe` without prior sanitization, allowing for SQL injection. The `orderByClause` variable is constructed without server-side validation or sanitization, enabling an attacker to execute arbitrary SQL commands. Successful exploitation can lead to complete data loss, modification, or corruption. | |
Title | SQL Injection in lunary-ai/lunary | |
Weaknesses | CWE-89 | |
References |
| |
Metrics |
cvssV3_0
|
MITRE
Status: PUBLISHED
Assigner: @huntr_ai
Published: 2024-11-01T12:05:12.189Z
Updated: 2024-11-01T13:19:19.973Z
Reserved: 2024-08-03T21:42:38.864Z
Link: CVE-2024-7456
Vulnrichment
Updated: 2024-11-01T13:19:14.317Z
NVD
Status : Analyzed
Published: 2024-11-01T12:15:03.557
Modified: 2024-11-06T15:45:58.993
Link: CVE-2024-7456
Redhat
No data.