
We found results for “”
CVE-2024-7456
Date: November 1, 2024
A SQL injection vulnerability exists in the "/api/v1/external-users" route of lunary-ai/lunary version v1.4.2. The "order by" clause of the SQL query uses "sql.unsafe" without prior sanitization, allowing for SQL injection. The "orderByClause" variable is constructed without server-side validation or sanitization, enabling an attacker to execute arbitrary SQL commands. Successful exploitation can lead to complete data loss, modification, or corruption.
Severity Score
Severity Score
Weakness Type (CWE)
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CWE-89CVSS v3.1
Base Score: |
|
---|---|
Attack Vector (AV): | NETWORK |
Attack Complexity (AC): | LOW |
Privileges Required (PR): | NONE |
User Interaction (UI): | NONE |
Scope (S): | UNCHANGED |
Confidentiality (C): | HIGH |
Integrity (I): | HIGH |
Availability (A): | HIGH |