In lunary-ai/lunary version 1.2.4, a vulnerability exists in the password recovery mechanism where the reset password token is not invalidated after use. This allows an attacker who compromises the recovery token to repeatedly change the password of a victim's account. The issue lies in the backend's handling of the reset password process, where the token, once used, is not discarded or invalidated, enabling its reuse. This vulnerability could lead to unauthorized account access if an attacker obtains the recovery token.
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: @huntr_ai

Published: 2024-06-06T17:46:06.653Z

Updated: 2024-06-06T17:46:06.653Z

Reserved: 2024-05-23T16:37:42.172Z


Link: CVE-2024-5277

JSON object: View

cve-icon NVD Information

Status : Awaiting Analysis

Published: 2024-06-06T18:15:20.087

Modified: 2024-06-07T14:56:05.647


Link: CVE-2024-5277

JSON object: View

cve-icon Redhat Information

No data.

CWE