A path traversal vulnerability in the get-project-files functionality of stitionai/devika allows attackers to read arbitrary files from the filesystem and cause a Denial of Service (DoS). This issue is present in all versions of the application. The vulnerability arises due to insufficient path sanitization for the 'project-name' parameter, enabling attackers to specify paths that traverse the filesystem. By setting 'project-name' to the root directory, an attacker can cause the application to attempt to read the entire filesystem, leading to a DoS condition.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: @huntr_ai

Published: 2024-06-30T00:00:13.962Z

Updated: 2024-08-01T21:25:03.166Z

Reserved: 2024-06-12T19:35:01.373Z

Link: CVE-2024-5926

cve-icon Vulnrichment

Updated: 2024-08-01T21:25:03.166Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-06-30T01:15:09.707

Modified: 2024-07-12T08:15:11.797

Link: CVE-2024-5926

cve-icon Redhat

No data.