CVE-2024-5334

External Control of File Name or Path (CWE-73)

Published: Jun 27, 2024 / Updated: 4mo ago

010
High Severity
(Estimated)
EPSS 0.04%
CVE info copied to clipboard

A local file read vulnerability exists in the stitionai/devika repository, affecting the latest version. The vulnerability is due to improper handling of the 'snapshot_path' parameter in the '/api/get-browser-snapshot' endpoint. An attacker can exploit this vulnerability by crafting a request with a malicious 'snapshot_path' parameter, leading to arbitrary file read from the system. This issue impacts the security of the application by allowing unauthorized access to sensitive files on the server.

Timeline

CVE Assignment

NVD published the first details for CVE-2024-5334

Jun 27, 2024 at 6:15 PM
First Article

Feedly found the first article mentioning CVE-2024-5334. See article

Jun 27, 2024 at 6:24 PM / National Vulnerability Database
CVSS Estimate

Feedly estimated the CVSS score as HIGH

Jun 27, 2024 at 6:35 PM
EPSS

EPSS Score was set to: 0.04% (Percentile: 9.1%)

Jun 28, 2024 at 9:57 AM
Static CVE Timeline Graph

Links to Mitre Att&cks

T1562.003: Impair Command History Logging
+null more

Attack Patterns

CAPEC-13: Subverting Environment Variable Values
+null more

Be the first to know about critical vulnerabilities

Collect, analyze, and share vulnerability reports faster using AI