{"uuid": "33d953a9-9523-4cbc-b932-0eede8f2bc96", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-10273", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/8274", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-10273\n\ud83d\udd25 CVSS Score: 6.5 (cvssV3_0, Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N)\n\ud83d\udd39 Description: In lunary-ai/lunary v1.5.0, improper privilege management in the models.ts file allows users with viewer roles to modify models owned by others. The PATCH endpoint for models does not have appropriate privilege checks, enabling low-privilege users to update models they should not have access to modify. This vulnerability could lead to unauthorized changes in critical resources, affecting the integrity and reliability of the system.\n\ud83d\udccf Published: 2025-03-20T10:08:48.120Z\n\ud83d\udccf Modified: 2025-03-20T19:03:10.116Z\n\ud83d\udd17 References:\n1. https://huntr.com/bounties/883d9fe2-5730-41e1-a5c2-59972489876e\n2. https://github.com/lunary-ai/lunary/commit/8ba1b8ba2c2c30b1cec30eb5777c1fda670cbbfc", "creation_timestamp": "2025-03-20T19:18:40.000000Z"}