Vulnerability Details CVE-2024-5755
In lunary-ai/lunary versions <=v1.2.11, an attacker can bypass email validation by using a dot character ('.') in the email address. This allows the creation of multiple accounts with essentially the same email address (e.g., 'attacker123@gmail.com' and 'attacker.123@gmail.com'), leading to incorrect synchronization and potential security issues.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 24.6%
CVSS Severity
CVSS v3 Score 5.3
Products affected by CVE-2024-5755
-
cpe:2.3:a:lunary:lunary:-
-
cpe:2.3:a:lunary:lunary:0.1.0
-
cpe:2.3:a:lunary:lunary:0.1.1
-
cpe:2.3:a:lunary:lunary:0.1.2
-
cpe:2.3:a:lunary:lunary:0.1.3
-
cpe:2.3:a:lunary:lunary:0.1.4
-
cpe:2.3:a:lunary:lunary:0.1.5
-
cpe:2.3:a:lunary:lunary:0.2.0
-
cpe:2.3:a:lunary:lunary:0.2.1
-
cpe:2.3:a:lunary:lunary:0.3.0
-
cpe:2.3:a:lunary:lunary:0.3.1
-
cpe:2.3:a:lunary:lunary:1.0.0
-
cpe:2.3:a:lunary:lunary:1.0.1
-
cpe:2.3:a:lunary:lunary:1.0.2
-
cpe:2.3:a:lunary:lunary:1.1.0
-
cpe:2.3:a:lunary:lunary:1.2.0
-
cpe:2.3:a:lunary:lunary:1.2.1
-
cpe:2.3:a:lunary:lunary:1.2.10
-
cpe:2.3:a:lunary:lunary:1.2.11
-
cpe:2.3:a:lunary:lunary:1.2.2
-
cpe:2.3:a:lunary:lunary:1.2.3
-
cpe:2.3:a:lunary:lunary:1.2.4
-
cpe:2.3:a:lunary:lunary:1.2.5
-
cpe:2.3:a:lunary:lunary:1.2.6
-
cpe:2.3:a:lunary:lunary:1.2.7
-
cpe:2.3:a:lunary:lunary:1.2.8
-
cpe:2.3:a:lunary:lunary:1.2.9