Skip to main content

CVE-2024-0354: CWE-24 Path Traversal: '../filedir' in unknown-o download-station

Medium
VulnerabilityCVE-2024-0354cvecve-2024-0354cwe-24
Published: Tue Jan 09 2024 (01/09/2024, 23:31:03 UTC)
Source: CVE
Vendor/Project: unknown-o
Product: download-station

Description

A vulnerability, which was classified as critical, has been found in unknown-o download-station up to 1.1.8. This issue affects some unknown processing of the file index.php. The manipulation of the argument f leads to path traversal: '../filedir'. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-250121 was assigned to this vulnerability.

AI-Powered Analysis

AILast updated: 07/06/2025, 13:55:00 UTC

Technical Analysis

CVE-2024-0354 is a path traversal vulnerability identified in the unknown-o download-station software versions 1.1.0 through 1.1.8. The vulnerability arises from improper sanitization of the 'f' argument processed by the index.php file. By manipulating this parameter with a path traversal payload such as '../filedir', an attacker can access files and directories outside the intended scope of the application. This vulnerability is remotely exploitable without requiring authentication or user interaction, making it accessible to any attacker with network access to the affected service. The vulnerability is classified under CWE-24 (Improper Restriction of File Name or Path) and has a CVSS v3.1 base score of 5.3, indicating a medium severity level. The impact primarily affects confidentiality, as unauthorized file read access could expose sensitive information. There is no indication that the vulnerability affects integrity or availability. No public exploit is currently known to be actively used in the wild, but the exploit details have been disclosed publicly, increasing the risk of exploitation. The lack of available patches or vendor-provided fixes at the time of publication means that affected organizations must rely on mitigation strategies until an official update is released.

Potential Impact

For European organizations, this vulnerability poses a moderate risk primarily to confidentiality. Attackers exploiting this flaw could access sensitive configuration files, credentials, or other private data stored on the server hosting download-station. This could lead to further compromise if credentials or secrets are exposed. Organizations using download-station in environments with sensitive or regulated data (e.g., financial institutions, healthcare providers, government agencies) could face compliance issues and reputational damage if data is leaked. Since the vulnerability does not require authentication and can be exploited remotely, exposed instances on public or internal networks are at risk. However, the absence of known active exploits and the medium CVSS score suggest that the immediate threat level is moderate rather than critical. Still, the presence of this vulnerability in a file handling component means that attackers could leverage it as a foothold for further attacks if combined with other vulnerabilities or misconfigurations.

Mitigation Recommendations

1. Immediate mitigation should focus on restricting network access to the download-station service, limiting exposure to trusted internal networks or VPNs only. 2. Implement web application firewall (WAF) rules to detect and block path traversal patterns in HTTP requests, specifically targeting the 'f' parameter in index.php. 3. Conduct thorough input validation and sanitization on the 'f' parameter to reject any input containing '../' or other traversal sequences. 4. Monitor logs for suspicious requests attempting path traversal to identify potential exploitation attempts. 5. If feasible, isolate the download-station application in a sandboxed or containerized environment with minimal file system permissions to limit the impact of any successful exploitation. 6. Engage with the vendor or community to obtain patches or updates addressing this vulnerability as soon as they become available and prioritize timely application of these patches. 7. Review and harden file system permissions on the server to ensure that the application process has access only to necessary directories and files, minimizing the risk of sensitive data exposure.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2024-01-09T14:24:13.422Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fb1484d88663aec8be

Added to database: 5/20/2025, 6:59:07 PM

Last enriched: 7/6/2025, 1:55:00 PM

Last updated: 7/26/2025, 8:00:18 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats