CVE-2024-5547

A directory traversal vulnerability exists in the /api/download-project-pdf endpoint of the stitionai/devika repository, affecting the latest version. The vulnerability arises due to insufficient sanitization of the 'project_name' parameter in the download_project_pdf function. Attackers can exploit this flaw by manipulating the 'project_name' parameter in a GET request to traverse the directory structure and download arbitrary PDF files from the system. This issue allows attackers to access sensitive information that could be stored in PDF format outside the intended directory.
Configurations

No configuration.

History

21 Nov 2024, 09:47

Type Values Removed Values Added
References () https://github.com/stitionai/devika/commit/6acce21fb08c3d1123ef05df6a33912bf0ee77c2 - () https://github.com/stitionai/devika/commit/6acce21fb08c3d1123ef05df6a33912bf0ee77c2 -
References () https://huntr.com/bounties/7ea0eb5f-7643-4452-bc93-a225e2090283 - () https://huntr.com/bounties/7ea0eb5f-7643-4452-bc93-a225e2090283 -
Summary (es) Path traversal relativo en el repositorio de GitHub stitionai/devika antes de -. (es) Existe una vulnerabilidad de directory traversal en el endpoint /api/download-project-pdf del repositorio stitionai/devika, que afecta a la última versión. La vulnerabilidad surge debido a una desinfección insuficiente del parámetro 'project_name' en la función download_project_pdf. Los atacantes pueden explotar esta falla manipulando el parámetro 'project_name' en una solicitud GET para recorrer la estructura de directorios y descargar archivos PDF arbitrarios del sistema. Este problema permite a los atacantes acceder a información confidencial que podría estar almacenada en formato PDF fuera del directorio previsto.

12 Jul 2024, 08:15

Type Values Removed Values Added
Summary
  • (es) Path traversal relativo en el repositorio de GitHub stitionai/devika antes de -.
Summary (en) Relative Path Traversal in GitHub repository stitionai/devika prior to -. (en) A directory traversal vulnerability exists in the /api/download-project-pdf endpoint of the stitionai/devika repository, affecting the latest version. The vulnerability arises due to insufficient sanitization of the 'project_name' parameter in the download_project_pdf function. Attackers can exploit this flaw by manipulating the 'project_name' parameter in a GET request to traverse the directory structure and download arbitrary PDF files from the system. This issue allows attackers to access sensitive information that could be stored in PDF format outside the intended directory.

27 Jun 2024, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-27 18:15

Updated : 2024-11-21 09:47


NVD link : CVE-2024-5547

Mitre link : CVE-2024-5547

CVE.ORG link : CVE-2024-5547


JSON object : View

Products Affected

No product.

CWE
CWE-23

Relative Path Traversal