Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-47445 | stitionai/devika main branch as of commit cdfb782b0e634b773b10963c8034dc9207ba1f9f is vulnerable to Local File Read (LFI) by Prompt Injection. The integration of Google Gimini 1.0 Pro with `HarmBlockThreshold.BLOCK_NONE` for `HarmCategory.HARM_CATEGORY_HATE_SPEECH` and `HarmCategory.HARM_CATEGORY_HARASSMENT` in `safety_settings` disables content protection. This allows malicious commands to be executed, such as reading sensitive file contents like `/etc/passwd`. |
Fri, 30 Aug 2024 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-200 | |
| Metrics |
cvssV3_0
|
Fri, 30 Aug 2024 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Local File Read (LFI) by Prompt Injection in stitionai/devika | Injection by Prompt Injection in stitionai/devika |
| Metrics |
cvssV3_1
|
cvssV3_1
|
Tue, 20 Aug 2024 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-74 | |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: @huntr_ai
Published:
Updated: 2024-08-30T15:27:54.554Z
Reserved: 2024-06-25T17:21:32.942Z
Link: CVE-2024-6331
Updated: 2024-08-05T15:52:04.571Z
Status : Modified
Published: 2024-08-04T00:15:47.863
Modified: 2024-08-30T16:15:10.710
Link: CVE-2024-6331
No data.
OpenCVE Enrichment
No data.
EUVD