A directory traversal vulnerability exists in the stitionai/devika repository, specifically within the /api/download-project endpoint. Attackers can exploit this vulnerability by manipulating the 'project_name' parameter in a GET request to download arbitrary files from the system. This issue affects the latest version of the repository. The vulnerability arises due to insufficient input validation in the 'download_project' function, allowing attackers to traverse the directory structure and access files outside the intended directory. This could lead to unauthorized access to sensitive files on the server.
References
Configurations
No configuration.
History
21 Nov 2024, 09:47
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/stitionai/devika/commit/6acce21fb08c3d1123ef05df6a33912bf0ee77c2 - | |
References | () https://huntr.com/bounties/ad7dd135-8839-4042-87c0-105af61d262c - |
12 Jul 2024, 08:15
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
Summary | (en) A directory traversal vulnerability exists in the stitionai/devika repository, specifically within the /api/download-project endpoint. Attackers can exploit this vulnerability by manipulating the 'project_name' parameter in a GET request to download arbitrary files from the system. This issue affects the latest version of the repository. The vulnerability arises due to insufficient input validation in the 'download_project' function, allowing attackers to traverse the directory structure and access files outside the intended directory. This could lead to unauthorized access to sensitive files on the server. |
27 Jun 2024, 18:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-06-27 18:15
Updated : 2024-11-21 09:47
NVD link : CVE-2024-5548
Mitre link : CVE-2024-5548
CVE.ORG link : CVE-2024-5548
JSON object : View
Products Affected
No product.
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')