CVE-2024-40422

July 24, 2024, 5:12 p.m.

None
No Score

Description

The snapshot_path parameter in the /api/get-browser-snapshot endpoint in stitionai devika v1 is susceptible to a path traversal attack. An attacker can manipulate the snapshot_path parameter to traverse directories and access sensitive files on the server. This can potentially lead to unauthorized access to critical system files and compromise the confidentiality and integrity of the system.

Product(s) Impacted

Product Versions
stitionai devika v1
  • []

Weaknesses

Common security weaknesses mapped to this vulnerability.

Timeline

Published: July 24, 2024, 4:15 p.m.
Last Modified: July 24, 2024, 5:12 p.m.

Status : Awaiting Analysis

CVE has been marked for Analysis. Normally once in this state the CVE will be analyzed by NVD staff within 24 hours.

More info

Source

cve@mitre.org

*Disclaimer: Some vulnerabilities do not have an associated CPE. To enhance the data, we use AI to infer CPEs based on CVE details. This is an automated process and might not always be accurate.