Skip to main content

CVE-2024-0358: CWE-284 Improper Access Controls in DeShang DSO2O

Medium
VulnerabilityCVE-2024-0358cvecve-2024-0358cwe-284
Published: Wed Jan 10 2024 (01/10/2024, 01:00:04 UTC)
Source: CVE Database V5
Vendor/Project: DeShang
Product: DSO2O

Description

A vulnerability was found in DeShang DSO2O up to 4.1.0. It has been classified as critical. This affects an unknown part of the file /install/install.php. The manipulation leads to improper access controls. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-250125 was assigned to this vulnerability.

AI-Powered Analysis

AILast updated: 07/03/2025, 22:57:26 UTC

Technical Analysis

CVE-2024-0358 is a vulnerability identified in DeShang's DSO2O product, specifically affecting versions 4.0 and 4.1. The issue is classified under CWE-284, which pertains to improper access controls. The vulnerability resides in an unspecified part of the /install/install.php file, allowing an attacker to bypass intended access restrictions. This flaw can be exploited remotely without requiring any authentication or user interaction, making it accessible to unauthenticated attackers over the network. The vulnerability has a CVSS v3.1 base score of 5.3, indicating a medium severity level. The vector string (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N) highlights that the attack can be launched remotely (Network), with low attack complexity, no privileges required, and no user interaction needed. The impact is limited to a low confidentiality breach, with no direct impact on integrity or availability. Although the exact nature of the data or functionality exposed is not detailed, improper access control in an installation script could potentially allow unauthorized access to installation or configuration routines, which might lead to information disclosure or facilitate further attacks. No public exploits are currently known to be in the wild, but the vulnerability details have been disclosed publicly, increasing the risk of exploitation. No patches or fixes have been linked yet, indicating that affected organizations need to monitor vendor communications closely for updates.

Potential Impact

For European organizations using DeShang DSO2O versions 4.0 or 4.1, this vulnerability presents a risk of unauthorized access to installation or configuration components of the software. While the confidentiality impact is rated low, improper access control in installation scripts can sometimes be leveraged as a foothold for attackers to gather sensitive information or prepare for more severe attacks. This is particularly concerning for organizations that rely on DSO2O for critical business operations or handle sensitive customer data. The remote and unauthenticated nature of the vulnerability increases the attack surface, especially for internet-facing deployments. European organizations with less mature network segmentation or insufficient monitoring may be more vulnerable to exploitation attempts. Although no active exploitation is currently reported, the public disclosure means threat actors could develop exploits, increasing the urgency for mitigation. The medium severity rating suggests that while immediate catastrophic impact is unlikely, the vulnerability should not be ignored, especially in regulated sectors such as finance, healthcare, or government where compliance with data protection laws (e.g., GDPR) is mandatory.

Mitigation Recommendations

1. Immediate mitigation should include restricting external access to the /install/install.php script through network controls such as firewalls or web application firewalls (WAFs), limiting exposure to trusted internal networks only. 2. Organizations should audit their DSO2O installations to confirm the version in use and identify if the vulnerable versions 4.0 or 4.1 are deployed. 3. Until an official patch is released, consider disabling or removing the installation script if it is not required for ongoing operations. 4. Implement strict access control policies around installation and configuration files, ensuring only authorized personnel can access these resources. 5. Monitor logs and network traffic for unusual access attempts to the installation script or related endpoints. 6. Engage with the vendor for timely updates and apply patches as soon as they become available. 7. Conduct a security review of the application’s deployment architecture to ensure proper segmentation and minimize exposure of critical components. 8. Educate IT and security teams about this vulnerability to raise awareness and readiness to respond to any exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2024-01-09T14:45:40.978Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 683f0a31182aa0cae27f6f1a

Added to database: 6/3/2025, 2:44:01 PM

Last enriched: 7/3/2025, 10:57:26 PM

Last updated: 8/16/2025, 5:32:22 AM

Views: 17

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats