stitionai/devika main branch as of commit cdfb782b0e634b773b10963c8034dc9207ba1f9f is vulnerable to Local File Read (LFI) by Prompt Injection. The integration of Google Gimini 1.0 Pro with `HarmBlockThreshold.BLOCK_NONE` for `HarmCategory.HARM_CATEGORY_HATE_SPEECH` and `HarmCategory.HARM_CATEGORY_HARASSMENT` in `safety_settings` disables content protection. This allows malicious commands to be executed, such as reading sensitive file contents like `/etc/passwd`.
Metrics
Affected Vendors & Products
References
History
Fri, 30 Aug 2024 16:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-200 | |
Metrics |
cvssV3_0
|
Fri, 30 Aug 2024 15:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Title | Local File Read (LFI) by Prompt Injection in stitionai/devika | Injection by Prompt Injection in stitionai/devika |
Metrics |
cvssV3_1
|
cvssV3_1
|
Tue, 20 Aug 2024 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-74 | |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: @huntr_ai
Published: 2024-08-04T00:00:15.148Z
Updated: 2024-08-30T15:27:54.554Z
Reserved: 2024-06-25T17:21:32.942Z
Link: CVE-2024-6331
Vulnrichment
Updated: 2024-08-05T15:52:04.571Z
NVD
Status : Modified
Published: 2024-08-04T00:15:47.863
Modified: 2024-08-30T16:15:10.710
Link: CVE-2024-6331
Redhat
No data.