VYPR
Unrated severityNVD Advisory· Published Jun 27, 2024· Updated Aug 1, 2024

Directory Traversal in stitionai/devika

CVE-2024-5547

Description

A directory traversal vulnerability exists in the /api/download-project-pdf endpoint of the stitionai/devika repository, affecting the latest version. The vulnerability arises due to insufficient sanitization of the 'project_name' parameter in the download_project_pdf function. Attackers can exploit this flaw by manipulating the 'project_name' parameter in a GET request to traverse the directory structure and download arbitrary PDF files from the system. This issue allows attackers to access sensitive information that could be stored in PDF format outside the intended directory.

Affected products

2
  • Stitionai/Devikallm-fuzzy
    Range: latest
  • stitionai/stitionai/devikav5
    Range: unspecified

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.