Описание
A path traversal vulnerability in the get-project-files functionality of stitionai/devika allows attackers to read arbitrary files from the filesystem and cause a Denial of Service (DoS). This issue is present in all versions of the application. The vulnerability arises due to insufficient path sanitization for the 'project-name' parameter, enabling attackers to specify paths that traverse the filesystem. By setting 'project-name' to the root directory, an attacker can cause the application to attempt to read the entire filesystem, leading to a DoS condition.
Ссылки
- ExploitThird Party Advisory
- ExploitThird Party Advisory
Уязвимые конфигурации
Конфигурация 1
cpe:2.3:a:stitionai:devika:*:*:*:*:*:*:*:*
EPSS
Процентиль: 51%
0.00283
Низкий
9.1 Critical
CVSS3
Дефекты
CWE-29
Связанные уязвимости
CVSS3: 9.1
github
больше 1 года назад
Path Traversal: '\..\filename' in GitHub repository stitionai/devika prior to -.
EPSS
Процентиль: 51%
0.00283
Низкий
9.1 Critical
CVSS3
Дефекты
CWE-29