CVE-2024-5548

A directory traversal vulnerability exists in the stitionai/devika repository, specifically within the /api/download-project endpoint. Attackers can exploit this vulnerability by manipulating the 'project_name' parameter in a GET request to download arbitrary files from the system. This issue affects the latest version of the repository. The vulnerability arises due to insufficient input validation in the 'download_project' function, allowing attackers to traverse the directory structure and access files outside the intended directory. This could lead to unauthorized access to sensitive files on the server.
Configurations

Configuration 1 (hide)

cpe:2.3:a:stitionai:devika:1.0:*:*:*:*:*:*:*

History

No history.

Information

Published : 2024-06-27 18:15

Updated : 2025-07-15 15:37


NVD link : CVE-2024-5548

Mitre link : CVE-2024-5548

CVE.ORG link : CVE-2024-5548


JSON object : View

Products Affected

stitionai

  • devika
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')