Описание
A directory traversal vulnerability exists in the /api/download-project-pdf endpoint of the stitionai/devika repository, affecting the latest version. The vulnerability arises due to insufficient sanitization of the 'project_name' parameter in the download_project_pdf function. Attackers can exploit this flaw by manipulating the 'project_name' parameter in a GET request to traverse the directory structure and download arbitrary PDF files from the system. This issue allows attackers to access sensitive information that could be stored in PDF format outside the intended directory.
Ссылки
- Patch
- ExploitThird Party Advisory
- Patch
- ExploitThird Party Advisory
Уязвимые конфигурации
Конфигурация 1
cpe:2.3:a:stitionai:devika:1.0:*:*:*:*:*:*:*
EPSS
Процентиль: 79%
0.01261
Низкий
7.5 High
CVSS3
Дефекты
CWE-23
Связанные уязвимости
CVSS3: 7.5
github
больше 1 года назад
Relative Path Traversal in GitHub repository stitionai/devika prior to -.
EPSS
Процентиль: 79%
0.01261
Низкий
7.5 High
CVSS3
Дефекты
CWE-23