icon

We found results for “

CVE-2024-7456

Date: November 1, 2024

A SQL injection vulnerability exists in the "/api/v1/external-users" route of lunary-ai/lunary version v1.4.2. The "order by" clause of the SQL query uses "sql.unsafe" without prior sanitization, allowing for SQL injection. The "orderByClause" variable is constructed without server-side validation or sanitization, enabling an attacker to execute arbitrary SQL commands. Successful exploitation can lead to complete data loss, modification, or corruption.

Severity Score

Severity Score

Weakness Type (CWE)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

CWE-89

CVSS v3.1

Base Score:
Attack Vector (AV): NETWORK
Attack Complexity (AC): LOW
Privileges Required (PR): NONE
User Interaction (UI): NONE
Scope (S): UNCHANGED
Confidentiality (C): HIGH
Integrity (I): HIGH
Availability (A): HIGH

Do you need more information?

Contact Us