High

lunary

SSRF Vulnerability in Authentication API Endpoint

A Server-Side Request Forgery (SSRF) vulnerability was identified in the authentication API endpoint of the lunary-ai/lunary application, specifically in the '/download-idp-xml' route. This vulnerability allows attackers to make unauthorized requests to internal or external resources. The affected version is the latest, and a patch has not been specified.

Available publicly on May 25 2024

8.6

CVSS:

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N

Remediation Steps
  • Ensure input validation is implemented for all URLs received from user input, particularly in the '/download-idp-xml' endpoint.
  • Employ a whitelist of allowed URLs or domains to restrict the destinations that can be accessed through the application.
  • Update the application to the latest version once a patch is available, ensuring that the SSRF vulnerability is remediated.
  • Regularly audit and review code for potential vulnerabilities, especially in areas where external resources are accessed based on user input.
  • Consider implementing additional security controls such as API gateways or firewalls to monitor and potentially block malicious traffic.
Patch Details
  • Fixed Version: N/A
  • Patch Commit: N/A
Want more out of Sightline?

Sightline offers even more for premium customers

Go Premium

We have - related security advisories that are available with Sightline Premium.