Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-3502: CWE-201 Insertion of Sensitive Information Into Sent Data in lunary-ai lunary-ai/lunary

0
Critical
VulnerabilityCVE-2024-3502cvecve-2024-3502cwe-201
Published: Thu Nov 14 2024 (11/14/2024, 17:34:45 UTC)
Source: CVE Database V5
Vendor/Project: lunary-ai
Product: lunary-ai/lunary

Description

In lunary-ai/lunary versions up to and including 1.2.5, an information disclosure vulnerability exists where account recovery hashes of users are inadvertently exposed to unauthorized actors. This issue occurs when authenticated users inspect responses from `GET /v1/users/me` and `GET /v1/users/me/org` endpoints. The exposed account recovery hashes, while not directly related to user passwords, represent sensitive information that should not be accessible to unauthorized parties. Exposing these hashes could potentially facilitate account recovery attacks or other malicious activities. The vulnerability was addressed in version 1.2.6.

AI-Powered Analysis

AILast updated: 10/15/2025, 13:27:01 UTC

Technical Analysis

CVE-2024-3502 is an information disclosure vulnerability classified under CWE-201, affecting lunary-ai/lunary software versions up to and including 1.2.5. The flaw arises because the application inadvertently includes account recovery hashes in the JSON responses of two API endpoints: GET /v1/users/me and GET /v1/users/me/org. These endpoints are accessible to authenticated users, but the exposure of recovery hashes is unintended and represents sensitive information leakage. Although these hashes are not equivalent to user passwords, they are critical for account recovery mechanisms and could be leveraged by attackers to bypass authentication controls or reset account credentials maliciously. The vulnerability does not require elevated privileges or user interaction, making it remotely exploitable by any authenticated user. The issue was resolved in version 1.2.6 by removing or securing the sensitive data from API responses. The CVSS v3.0 base score of 9.1 indicates a critical severity, with network attack vector, low attack complexity, no privileges required, and no user interaction needed. The vulnerability impacts confidentiality and integrity but not availability. No public exploits have been reported yet, but the potential for account takeover or unauthorized access is significant.

Potential Impact

For European organizations, this vulnerability poses a significant risk to user account security and data integrity. Exposure of account recovery hashes could allow attackers to perform unauthorized account recovery, potentially leading to account takeover, data theft, or unauthorized access to organizational resources. This is especially critical for organizations relying on lunary-ai/lunary for sensitive or proprietary data management. The lack of required privileges or user interaction lowers the barrier for exploitation, increasing the likelihood of abuse if attackers gain authenticated access. Compromise of user accounts could lead to further lateral movement within networks, data exfiltration, or disruption of business operations. Additionally, organizations subject to strict data protection regulations such as GDPR may face compliance and reputational risks if user data is compromised due to this vulnerability.

Mitigation Recommendations

European organizations using lunary-ai/lunary should immediately upgrade to version 1.2.6 or later, where the vulnerability is patched. Until the upgrade is applied, restrict access to the affected API endpoints to only trusted and necessary users, and monitor API usage logs for unusual access patterns or attempts to retrieve sensitive data. Implement strong authentication and session management controls to limit the risk of unauthorized authenticated access. Conduct thorough audits of account recovery mechanisms to ensure no other sensitive information is exposed. Additionally, educate users about phishing and social engineering risks that could exploit leaked recovery information. Employ network segmentation and least privilege principles to minimize the impact of any compromised accounts. Finally, maintain an incident response plan to quickly address any suspected account compromises.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
@huntr_ai
Date Reserved
2024-04-09T01:41:03.746Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 68ef9b26178f764e1f470b89

Added to database: 10/15/2025, 1:01:26 PM

Last enriched: 10/15/2025, 1:27:01 PM

Last updated: 10/16/2025, 2:44:57 PM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats