lunary-ai/lunary Access Control Vulnerability in Prompt Variation Management
Moderate severity
GitHub Reviewed
Published
Jun 10, 2024
to the GitHub Advisory Database
•
Updated Nov 25, 2024
Withdrawn
This advisory was withdrawn on Nov 18, 2024
Description
Published by the National Vulnerability Database
Jun 9, 2024
Published to the GitHub Advisory Database
Jun 10, 2024
Reviewed
Jun 10, 2024
Withdrawn
Nov 18, 2024
Last updated
Nov 25, 2024
Withdrawn: This advisory was incorrectly linked the the npm package
lunary
. The advisory is valid, but not for that package.In lunary-ai/lunary version 1.2.13, an insufficient granularity of access control vulnerability allows users to create, update, get, and delete prompt variations for datasets not owned by their organization. This issue arises due to the application not properly validating the ownership of dataset prompts and their variations against the organization or project of the requesting user. As a result, unauthorized modifications to dataset prompts can occur, leading to altered or removed dataset prompts without proper authorization. This vulnerability impacts the integrity and consistency of dataset information, potentially affecting the results of experiments.
References