Vulnerability Description
stitionai/devika main branch as of commit cdfb782b0e634b773b10963c8034dc9207ba1f9f is vulnerable to Local File Read (LFI) by Prompt Injection. The integration of Google Gimini 1.0 Pro with `HarmBlockThreshold.BLOCK_NONE` for `HarmCategory.HARM_CATEGORY_HATE_SPEECH` and `HarmCategory.HARM_CATEGORY_HARASSMENT` in `safety_settings` disables content protection. This allows malicious commands to be executed, such as reading sensitive file contents like `/etc/passwd`.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Stitionai | Devika | >= 2024-05-02 |
Related Weaknesses (CWE)
References
- https://huntr.com/bounties/d5ac1051-22fa-42f0-8d82-73267482e60fExploitThird Party Advisory
FAQ
What is CVE-2024-6331?
CVE-2024-6331 is a vulnerability with a CVSS score of 7.5 (HIGH). stitionai/devika main branch as of commit cdfb782b0e634b773b10963c8034dc9207ba1f9f is vulnerable to Local File Read (LFI) by Prompt Injection. The integration of Google Gimini 1.0 Pro with `HarmBlockT...
How severe is CVE-2024-6331?
CVE-2024-6331 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-6331?
Check the references section above for vendor advisories and patch information. Affected products include: Stitionai Devika.