Описание
A directory traversal vulnerability exists in the stitionai/devika repository, specifically within the /api/download-project endpoint. Attackers can exploit this vulnerability by manipulating the 'project_name' parameter in a GET request to download arbitrary files from the system. This issue affects the latest version of the repository. The vulnerability arises due to insufficient input validation in the 'download_project' function, allowing attackers to traverse the directory structure and access files outside the intended directory. This could lead to unauthorized access to sensitive files on the server.
Ссылки
- Patch
- ExploitThird Party Advisory
- Patch
- ExploitThird Party Advisory
Уязвимые конфигурации
Конфигурация 1
cpe:2.3:a:stitionai:devika:1.0:*:*:*:*:*:*:*
EPSS
Процентиль: 75%
0.00887
Низкий
7.5 High
CVSS3
Дефекты
CWE-22
Связанные уязвимости
CVSS3: 7.5
github
больше 1 года назад
Path Traversal in GitHub repository stitionai/devika prior to -.
EPSS
Процентиль: 75%
0.00887
Низкий
7.5 High
CVSS3
Дефекты
CWE-22