CVE-2024-6433

The application zips all the files in the folder specified by the user, which allows an attacker to read arbitrary files on the system by providing a crafted path. This vulnerability can be exploited by sending a request to the application with a malicious snapshot_path parameter.
Configurations

No configuration.

History

21 Nov 2024, 09:49

Type Values Removed Values Added
References () https://huntr.com/bounties/7d0463dd-6373-4eb8-86fc-beac0a1391a5 - () https://huntr.com/bounties/7d0463dd-6373-4eb8-86fc-beac0a1391a5 -

12 Jul 2024, 08:15

Type Values Removed Values Added
Summary (en) Relative Path Traversal in GitHub repository stitionai/devika prior to -. (en) The application zips all the files in the folder specified by the user, which allows an attacker to read arbitrary files on the system by providing a crafted path. This vulnerability can be exploited by sending a request to the application with a malicious snapshot_path parameter.

11 Jul 2024, 13:05

Type Values Removed Values Added
Summary
  • (es) Path Traversal relativo en el repositorio de GitHub stitionai/devika antes de -.

10 Jul 2024, 01:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-10 01:15

Updated : 2024-11-21 09:49


NVD link : CVE-2024-6433

Mitre link : CVE-2024-6433

CVE.ORG link : CVE-2024-6433


JSON object : View

Products Affected

No product.

CWE
CWE-23

Relative Path Traversal