CVE-2024-5547 (GCVE-0-2024-5547)
Vulnerability from cvelistv5 – Published: 2024-06-27 17:33 – Updated: 2024-08-01 21:18
VLAI?
Title
Directory Traversal in stitionai/devika
Summary
A directory traversal vulnerability exists in the /api/download-project-pdf endpoint of the stitionai/devika repository, affecting the latest version. The vulnerability arises due to insufficient sanitization of the 'project_name' parameter in the download_project_pdf function. Attackers can exploit this flaw by manipulating the 'project_name' parameter in a GET request to traverse the directory structure and download arbitrary PDF files from the system. This issue allows attackers to access sensitive information that could be stored in PDF format outside the intended directory.
Severity ?
7.5 (High)
CWE
- CWE-23 - Relative Path Traversal
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| stitionai | stitionai/devika |
Affected:
unspecified , < -
(custom)
|
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:a:stitionai:devika:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "devika",
"vendor": "stitionai",
"versions": [
{
"lessThan": "*",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-5547",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-07-09T20:32:24.866968Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-07-10T14:15:03.362Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-01T21:18:06.450Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://huntr.com/bounties/7ea0eb5f-7643-4452-bc93-a225e2090283"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/stitionai/devika/commit/6acce21fb08c3d1123ef05df6a33912bf0ee77c2"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "stitionai/devika",
"vendor": "stitionai",
"versions": [
{
"lessThan": "-",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A directory traversal vulnerability exists in the /api/download-project-pdf endpoint of the stitionai/devika repository, affecting the latest version. The vulnerability arises due to insufficient sanitization of the \u0027project_name\u0027 parameter in the download_project_pdf function. Attackers can exploit this flaw by manipulating the \u0027project_name\u0027 parameter in a GET request to traverse the directory structure and download arbitrary PDF files from the system. This issue allows attackers to access sensitive information that could be stored in PDF format outside the intended directory."
}
],
"metrics": [
{
"cvssV3_0": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-23",
"description": "CWE-23 Relative Path Traversal",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-07-12T07:41:27.139Z",
"orgId": "c09c270a-b464-47c1-9133-acb35b22c19a",
"shortName": "@huntr_ai"
},
"references": [
{
"url": "https://huntr.com/bounties/7ea0eb5f-7643-4452-bc93-a225e2090283"
},
{
"url": "https://github.com/stitionai/devika/commit/6acce21fb08c3d1123ef05df6a33912bf0ee77c2"
}
],
"source": {
"advisory": "7ea0eb5f-7643-4452-bc93-a225e2090283",
"discovery": "EXTERNAL"
},
"title": "Directory Traversal in stitionai/devika"
}
},
"cveMetadata": {
"assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a",
"assignerShortName": "@huntr_ai",
"cveId": "CVE-2024-5547",
"datePublished": "2024-06-27T17:33:35.488Z",
"dateReserved": "2024-05-30T19:10:14.492Z",
"dateUpdated": "2024-08-01T21:18:06.450Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"descriptions": "[{\"lang\": \"en\", \"value\": \"A directory traversal vulnerability exists in the /api/download-project-pdf endpoint of the stitionai/devika repository, affecting the latest version. The vulnerability arises due to insufficient sanitization of the \u0027project_name\u0027 parameter in the download_project_pdf function. Attackers can exploit this flaw by manipulating the \u0027project_name\u0027 parameter in a GET request to traverse the directory structure and download arbitrary PDF files from the system. This issue allows attackers to access sensitive information that could be stored in PDF format outside the intended directory.\"}, {\"lang\": \"es\", \"value\": \"Existe una vulnerabilidad de directory traversal en el endpoint /api/download-project-pdf del repositorio stitionai/devika, que afecta a la \\u00faltima versi\\u00f3n. La vulnerabilidad surge debido a una desinfecci\\u00f3n insuficiente del par\\u00e1metro \u0027project_name\u0027 en la funci\\u00f3n download_project_pdf. Los atacantes pueden explotar esta falla manipulando el par\\u00e1metro \u0027project_name\u0027 en una solicitud GET para recorrer la estructura de directorios y descargar archivos PDF arbitrarios del sistema. Este problema permite a los atacantes acceder a informaci\\u00f3n confidencial que podr\\u00eda estar almacenada en formato PDF fuera del directorio previsto.\"}]",
"id": "CVE-2024-5547",
"lastModified": "2024-11-21T09:47:54.260",
"metrics": "{\"cvssMetricV30\": [{\"source\": \"security@huntr.dev\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\", \"baseScore\": 7.5, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 3.6}]}",
"published": "2024-06-27T18:15:20.493",
"references": "[{\"url\": \"https://github.com/stitionai/devika/commit/6acce21fb08c3d1123ef05df6a33912bf0ee77c2\", \"source\": \"security@huntr.dev\"}, {\"url\": \"https://huntr.com/bounties/7ea0eb5f-7643-4452-bc93-a225e2090283\", \"source\": \"security@huntr.dev\"}, {\"url\": \"https://github.com/stitionai/devika/commit/6acce21fb08c3d1123ef05df6a33912bf0ee77c2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://huntr.com/bounties/7ea0eb5f-7643-4452-bc93-a225e2090283\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "security@huntr.dev",
"vulnStatus": "Awaiting Analysis",
"weaknesses": "[{\"source\": \"security@huntr.dev\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-23\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2024-5547\",\"sourceIdentifier\":\"security@huntr.dev\",\"published\":\"2024-06-27T18:15:20.493\",\"lastModified\":\"2025-07-15T15:37:21.163\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A directory traversal vulnerability exists in the /api/download-project-pdf endpoint of the stitionai/devika repository, affecting the latest version. The vulnerability arises due to insufficient sanitization of the \u0027project_name\u0027 parameter in the download_project_pdf function. Attackers can exploit this flaw by manipulating the \u0027project_name\u0027 parameter in a GET request to traverse the directory structure and download arbitrary PDF files from the system. This issue allows attackers to access sensitive information that could be stored in PDF format outside the intended directory.\"},{\"lang\":\"es\",\"value\":\"Existe una vulnerabilidad de directory traversal en el endpoint /api/download-project-pdf del repositorio stitionai/devika, que afecta a la \u00faltima versi\u00f3n. La vulnerabilidad surge debido a una desinfecci\u00f3n insuficiente del par\u00e1metro \u0027project_name\u0027 en la funci\u00f3n download_project_pdf. Los atacantes pueden explotar esta falla manipulando el par\u00e1metro \u0027project_name\u0027 en una solicitud GET para recorrer la estructura de directorios y descargar archivos PDF arbitrarios del sistema. Este problema permite a los atacantes acceder a informaci\u00f3n confidencial que podr\u00eda estar almacenada en formato PDF fuera del directorio previsto.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"security@huntr.dev\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"security@huntr.dev\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-23\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:stitionai:devika:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E48B4C29-E925-4C73-BFC6-83FAF8741CCC\"}]}]}],\"references\":[{\"url\":\"https://github.com/stitionai/devika/commit/6acce21fb08c3d1123ef05df6a33912bf0ee77c2\",\"source\":\"security@huntr.dev\",\"tags\":[\"Patch\"]},{\"url\":\"https://huntr.com/bounties/7ea0eb5f-7643-4452-bc93-a225e2090283\",\"source\":\"security@huntr.dev\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/stitionai/devika/commit/6acce21fb08c3d1123ef05df6a33912bf0ee77c2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://huntr.com/bounties/7ea0eb5f-7643-4452-bc93-a225e2090283\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://huntr.com/bounties/7ea0eb5f-7643-4452-bc93-a225e2090283\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://github.com/stitionai/devika/commit/6acce21fb08c3d1123ef05df6a33912bf0ee77c2\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-01T21:18:06.450Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-5547\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"poc\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-07-09T20:32:24.866968Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:stitionai:devika:*:*:*:*:*:*:*:*\"], \"vendor\": \"stitionai\", \"product\": \"devika\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"*\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-07-05T17:12:28.604Z\"}}], \"cna\": {\"title\": \"Directory Traversal in stitionai/devika\", \"source\": {\"advisory\": \"7ea0eb5f-7643-4452-bc93-a225e2090283\", \"discovery\": \"EXTERNAL\"}, \"metrics\": [{\"cvssV3_0\": {\"scope\": \"UNCHANGED\", \"version\": \"3.0\", \"baseScore\": 7.5, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}}], \"affected\": [{\"vendor\": \"stitionai\", \"product\": \"stitionai/devika\", \"versions\": [{\"status\": \"affected\", \"version\": \"unspecified\", \"lessThan\": \"-\", \"versionType\": \"custom\"}]}], \"references\": [{\"url\": \"https://huntr.com/bounties/7ea0eb5f-7643-4452-bc93-a225e2090283\"}, {\"url\": \"https://github.com/stitionai/devika/commit/6acce21fb08c3d1123ef05df6a33912bf0ee77c2\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"A directory traversal vulnerability exists in the /api/download-project-pdf endpoint of the stitionai/devika repository, affecting the latest version. The vulnerability arises due to insufficient sanitization of the \u0027project_name\u0027 parameter in the download_project_pdf function. Attackers can exploit this flaw by manipulating the \u0027project_name\u0027 parameter in a GET request to traverse the directory structure and download arbitrary PDF files from the system. This issue allows attackers to access sensitive information that could be stored in PDF format outside the intended directory.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-23\", \"description\": \"CWE-23 Relative Path Traversal\"}]}], \"providerMetadata\": {\"orgId\": \"c09c270a-b464-47c1-9133-acb35b22c19a\", \"shortName\": \"@huntr_ai\", \"dateUpdated\": \"2024-07-12T07:41:27.139Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2024-5547\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-08-01T21:18:06.450Z\", \"dateReserved\": \"2024-05-30T19:10:14.492Z\", \"assignerOrgId\": \"c09c270a-b464-47c1-9133-acb35b22c19a\", \"datePublished\": \"2024-06-27T17:33:35.488Z\", \"assignerShortName\": \"@huntr_ai\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…