Логотип exploitDog
bind:CVE-2024-5926
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-5926

Количество 2

Количество 2

nvd логотип

CVE-2024-5926

больше 1 года назад

A path traversal vulnerability in the get-project-files functionality of stitionai/devika allows attackers to read arbitrary files from the filesystem and cause a Denial of Service (DoS). This issue is present in all versions of the application. The vulnerability arises due to insufficient path sanitization for the 'project-name' parameter, enabling attackers to specify paths that traverse the filesystem. By setting 'project-name' to the root directory, an attacker can cause the application to attempt to read the entire filesystem, leading to a DoS condition.

CVSS3: 9.1
EPSS: Низкий
github логотип

GHSA-622m-gm3h-6w77

больше 1 года назад

Path Traversal: '\..\filename' in GitHub repository stitionai/devika prior to -.

CVSS3: 9.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-5926

A path traversal vulnerability in the get-project-files functionality of stitionai/devika allows attackers to read arbitrary files from the filesystem and cause a Denial of Service (DoS). This issue is present in all versions of the application. The vulnerability arises due to insufficient path sanitization for the 'project-name' parameter, enabling attackers to specify paths that traverse the filesystem. By setting 'project-name' to the root directory, an attacker can cause the application to attempt to read the entire filesystem, leading to a DoS condition.

CVSS3: 9.1
0%
Низкий
больше 1 года назад
github логотип
GHSA-622m-gm3h-6w77

Path Traversal: '\..\filename' in GitHub repository stitionai/devika prior to -.

CVSS3: 9.1
0%
Низкий
больше 1 года назад

Уязвимостей на страницу