Vulnerability Description
A path traversal vulnerability in the get-project-files functionality of stitionai/devika allows attackers to read arbitrary files from the filesystem and cause a Denial of Service (DoS). This issue is present in all versions of the application. The vulnerability arises due to insufficient path sanitization for the 'project-name' parameter, enabling attackers to specify paths that traverse the filesystem. By setting 'project-name' to the root directory, an attacker can cause the application to attempt to read the entire filesystem, leading to a DoS condition.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Stitionai | Devika | All versions |
Related Weaknesses (CWE)
References
- https://huntr.com/bounties/19af24fe-9b90-4638-8fbc-b18def6985d7ExploitThird Party Advisory
- https://huntr.com/bounties/19af24fe-9b90-4638-8fbc-b18def6985d7ExploitThird Party Advisory
FAQ
What is CVE-2024-5926?
CVE-2024-5926 is a vulnerability with a CVSS score of 9.1 (CRITICAL). A path traversal vulnerability in the get-project-files functionality of stitionai/devika allows attackers to read arbitrary files from the filesystem and cause a Denial of Service (DoS). This issue i...
How severe is CVE-2024-5926?
CVE-2024-5926 has been rated CRITICAL with a CVSS base score of 9.1/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2024-5926?
Check the references section above for vendor advisories and patch information. Affected products include: Stitionai Devika.