Логотип exploitDog
bind:CVE-2024-5548
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-5548

Количество 2

Количество 2

nvd логотип

CVE-2024-5548

больше 1 года назад

A directory traversal vulnerability exists in the stitionai/devika repository, specifically within the /api/download-project endpoint. Attackers can exploit this vulnerability by manipulating the 'project_name' parameter in a GET request to download arbitrary files from the system. This issue affects the latest version of the repository. The vulnerability arises due to insufficient input validation in the 'download_project' function, allowing attackers to traverse the directory structure and access files outside the intended directory. This could lead to unauthorized access to sensitive files on the server.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-73cq-4mxr-2h5h

больше 1 года назад

Path Traversal in GitHub repository stitionai/devika prior to -.

CVSS3: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-5548

A directory traversal vulnerability exists in the stitionai/devika repository, specifically within the /api/download-project endpoint. Attackers can exploit this vulnerability by manipulating the 'project_name' parameter in a GET request to download arbitrary files from the system. This issue affects the latest version of the repository. The vulnerability arises due to insufficient input validation in the 'download_project' function, allowing attackers to traverse the directory structure and access files outside the intended directory. This could lead to unauthorized access to sensitive files on the server.

CVSS3: 7.5
1%
Низкий
больше 1 года назад
github логотип
GHSA-73cq-4mxr-2h5h

Path Traversal in GitHub repository stitionai/devika prior to -.

CVSS3: 7.5
1%
Низкий
больше 1 года назад

Уязвимостей на страницу