|
|||
Rule General Information |
---|
Release Date: | 2024-11-13 | |
Rule Name: | Lunary 1.4.2 SQL Injection Vulnerability (CVE-2024-7456) | |
Severity: | ||
CVE ID: | ||
Rule Protection Details |
---|
Description: | A SQL injection vulnerability exists in the `/api/v1/external-users` route of lunary-ai/lunary version v1.4.2. The `order by` clause of the SQL query uses `sql.unsafe` without prior sanitization, allowing for SQL injection. The `orderByClause` variable is constructed without server-side validation or sanitization, enabling an attacker to execute arbitrary SQL commands. Successful exploitation can lead to complete data loss, modification, or corruption. | |
Impact: | An attacker can inject arbitrary sql commands to view or change the database of the target by exploiting the vulnerability successfully. | |
Affected OS: | Windows, Linux, Others | |
Reference: | https://github.com/lunary-ai/lunary/commit/6a0bc201181e0f4a0cc375ccf4ef0d7ae65c8a8e https://huntr.com/bounties/bfb3015e-5642-4d94-ab49-e8b49c4e07e4 |
|
Solutions |
---|
Please refer to announcements or patches release by the vendor: https://github.com/lunary-ai/lunary/commit/6a0bc201181e0f4a0cc375ccf4ef0d7ae65c8a8e |