The snapshot_path parameter in stitionai devika v1 is susceptible to a path traversal attack, leading to unauthorized access to critical system file
Reporter | Title | Published | Views | Family All 11 |
---|---|---|---|---|
![]() | Devika v1 - Path Traversal via 'snapshot_path' | 4 Aug 202400:00 | – | exploitdb |
![]() | Exploit for Path Traversal in Stitionai Devika | 6 Aug 202407:09 | – | githubexploit |
![]() | Exploit for Path Traversal in Stitionai Devika | 5 Aug 202422:21 | – | githubexploit |
![]() | Exploit for Path Traversal in Stitionai Devika | 3 Jul 202421:43 | – | githubexploit |
![]() | CVE-2024-40422 | 24 Jul 202400:00 | – | cvelist |
![]() | CVE-2024-40422 | 24 Jul 202400:00 | – | vulnrichment |
![]() | Devika v1 - Path Traversal via (snapshot_path) Exploit | 4 Aug 202400:00 | – | zdt |
![]() | Devika v1 - Path Traversal | 5 Aug 202417:49 | – | nuclei |
![]() | CVE-2024-40422 | 24 Jul 202416:15 | – | nvd |
![]() | Devika 1 Path Traversal | 5 Aug 202400:00 | – | packetstorm |
Parameter | Position | Path | Description | CWE |
---|---|---|---|---|
snapshot_path | query param | /api/get-browser-snapshot | The snapshot_path parameter is susceptible to a path traversal attack, allowing access to sensitive files on the server. | CWE-22 |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo