A directory traversal vulnerability exists in the /api/download-project-pdf endpoint of the stitionai/devika repository, affecting the latest version. The vulnerability arises due to insufficient sanitization of the 'project_name' parameter in the download_project_pdf function. Attackers can exploit this flaw by manipulating the 'project_name' parameter in a GET request to traverse the directory structure and download arbitrary PDF files from the system. This issue allows attackers to access sensitive information that could be stored in PDF format outside the intended directory.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: @huntr_ai

Published: 2024-06-27T17:33:35.488Z

Updated: 2024-08-01T21:18:06.450Z

Reserved: 2024-05-30T19:10:14.492Z

Link: CVE-2024-5547

cve-icon Vulnrichment

Updated: 2024-08-01T21:18:06.450Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-06-27T18:15:20.493

Modified: 2024-07-12T08:15:11.230

Link: CVE-2024-5547

cve-icon Redhat

No data.