Количество 2
Количество 2
CVE-2024-5926
A path traversal vulnerability in the get-project-files functionality of stitionai/devika allows attackers to read arbitrary files from the filesystem and cause a Denial of Service (DoS). This issue is present in all versions of the application. The vulnerability arises due to insufficient path sanitization for the 'project-name' parameter, enabling attackers to specify paths that traverse the filesystem. By setting 'project-name' to the root directory, an attacker can cause the application to attempt to read the entire filesystem, leading to a DoS condition.
GHSA-622m-gm3h-6w77
Path Traversal: '\..\filename' in GitHub repository stitionai/devika prior to -.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2024-5926 A path traversal vulnerability in the get-project-files functionality of stitionai/devika allows attackers to read arbitrary files from the filesystem and cause a Denial of Service (DoS). This issue is present in all versions of the application. The vulnerability arises due to insufficient path sanitization for the 'project-name' parameter, enabling attackers to specify paths that traverse the filesystem. By setting 'project-name' to the root directory, an attacker can cause the application to attempt to read the entire filesystem, leading to a DoS condition. | CVSS3: 9.1 | 0% Низкий | больше 1 года назад | |
GHSA-622m-gm3h-6w77 Path Traversal: '\..\filename' in GitHub repository stitionai/devika prior to -. | CVSS3: 9.1 | 0% Низкий | больше 1 года назад |
Уязвимостей на страницу