Overview
- Description
- A SQL injection vulnerability exists in the `/api/v1/external-users` route of lunary-ai/lunary version v1.4.2. The `order by` clause of the SQL query uses `sql.unsafe` without prior sanitization, allowing for SQL injection. The `orderByClause` variable is constructed without server-side validation or sanitization, enabling an attacker to execute arbitrary SQL commands. Successful exploitation can lead to complete data loss, modification, or corruption.
- Source
- security@huntr.dev
- NVD status
- Analyzed
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
CVSS 3.0
- Type
- Secondary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
Social media
- Hype score
- Not currently trending
CVE-2024-7456 Critical SQL Injection in Lunary AI v1.4.2 Exploitable Vulnerability: There's a SQL injection issue in the `/api/v1/external-users` route of lunary-ai/lunary v1.4.2. The problem is with the `order b... https://t.co/0jQws0OQze
@VulmonFeeds
1 Nov 2024
10 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[CVE-2024-7456: CRITICAL] Critical SQL injection vulnerability found in lunary-ai/lunary v1.4.2. Attackers can execute malicious SQL commands through '/api/v1/external-users' route, risking data loss.#cybersecurity,#vulnerability https://t.co/RwEEL0iq5U https://t.co/hp4NY0q6h7
@CveFindCom
1 Nov 2024
29 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2024-7456 A SQL injection vulnerability exists in the `/api/v1/external-users` route of lunary-ai/lunary version v1.4.2. The `order by` clause of the SQL query uses `sql.unsafe` … https://t.co/bv33BP65Sg
@CVEnew
1 Nov 2024
328 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:lunary:lunary:1.4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7A64BDBD-DC45-4169-A233-B1146A3EED5A" } ], "operator": "OR" } ] } ]