A path traversal vulnerability in the get-project-files functionality of stitionai/devika allows attackers to read arbitrary files from the filesystem and cause a Denial of Service (DoS). This issue is present in all versions of the application. The vulnerability arises due to insufficient path sanitization for the 'project-name' parameter, enabling attackers to specify paths that traverse the filesystem. By setting 'project-name' to the root directory, an attacker can cause the application to attempt to read the entire filesystem, leading to a DoS condition.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: @huntr_ai
Published:
Updated: 2024-08-01T21:25:03.166Z
Reserved: 2024-06-12T19:35:01.373Z
Link: CVE-2024-5926

Updated: 2024-08-01T21:25:03.166Z

Status : Awaiting Analysis
Published: 2024-06-30T01:15:09.707
Modified: 2024-11-21T09:48:35.497
Link: CVE-2024-5926

No data.