2024-06-30 00:00:13
@huntr_ai
PUBLISHED
A path traversal vulnerability in the get-project-files functionality of stitionai/devika allows attackers to read arbitrary files from the filesystem and cause a Denial of Service (DoS). This issue is present in all versions of the application. The vulnerability arises due to insufficient path sanitization for the project-name parameter, enabling attackers to specify paths that traverse the filesystem. By setting project-name to the root directory, an attacker can cause the application to attempt to read the entire filesystem, leading to a DoS condition.