VYPR
Unrated severityNVD Advisory· Published Jun 27, 2024· Updated Aug 1, 2024

Directory Traversal in stitionai/devika

CVE-2024-5548

Description

A directory traversal vulnerability exists in the stitionai/devika repository, specifically within the /api/download-project endpoint. Attackers can exploit this vulnerability by manipulating the 'project_name' parameter in a GET request to download arbitrary files from the system. This issue affects the latest version of the repository. The vulnerability arises due to insufficient input validation in the 'download_project' function, allowing attackers to traverse the directory structure and access files outside the intended directory. This could lead to unauthorized access to sensitive files on the server.

Affected products

2
  • Stitionai/Devikallm-fuzzy
    Range: latest
  • stitionai/stitionai/devikav5
    Range: unspecified

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.