A path traversal vulnerability in the get-project-files functionality of stitionai/devika allows attackers to read arbitrary files from the filesystem and cause a Denial of Service (DoS). This issue is present in all versions of the application. The vulnerability arises due to insufficient path sanitization for the 'project-name' parameter, enabling attackers to specify paths that traverse the filesystem. By setting 'project-name' to the root directory, an attacker can cause the application to attempt to read the entire filesystem, leading to a DoS condition.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: @huntr_ai
Published: 2024-06-30T00:00:13.962Z
Updated: 2024-08-01T21:25:03.166Z
Reserved: 2024-06-12T19:35:01.373Z
Link: CVE-2024-5926
Vulnrichment
Updated: 2024-08-01T21:25:03.166Z
NVD
Status : Awaiting Analysis
Published: 2024-06-30T01:15:09.707
Modified: 2024-07-12T08:15:11.797
Link: CVE-2024-5926
Redhat
No data.