Skip to main content

CVE-2024-0411: CWE-284 Improper Access Controls in DeShang DSMall

Medium
VulnerabilityCVE-2024-0411cvecve-2024-0411cwe-284
Published: Thu Jan 11 2024 (01/11/2024, 16:31:04 UTC)
Source: CVE Database V5
Vendor/Project: DeShang
Product: DSMall

Description

A vulnerability was found in DeShang DSMall up to 6.1.0. It has been classified as problematic. This affects an unknown part of the file public/install.php of the component HTTP GET Request Handler. The manipulation leads to improper access controls. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-250431.

AI-Powered Analysis

AILast updated: 07/04/2025, 15:26:13 UTC

Technical Analysis

CVE-2024-0411 is a medium-severity vulnerability identified in DeShang DSMall versions 6.0 and 6.1. The vulnerability stems from improper access controls (CWE-284) in the HTTP GET request handler, specifically within the public/install.php file. This flaw allows an unauthenticated remote attacker to manipulate access controls, potentially bypassing restrictions that should prevent unauthorized actions. The vulnerability does not require any user interaction or privileges to exploit, and the attack surface is exposed via network (AV:N), making it remotely exploitable with low attack complexity (AC:L). The impact is limited to confidentiality, with no direct effect on integrity or availability. Although no known exploits are currently observed in the wild, the public disclosure of the vulnerability increases the risk of exploitation. The lack of a patch link suggests that remediation may not yet be available, emphasizing the need for immediate mitigation measures. The vulnerability's presence in the installation script (install.php) indicates that attackers might leverage it to gain unauthorized access or gather sensitive information during or after the installation process, potentially compromising the deployment environment or configuration data.

Potential Impact

For European organizations using DeShang DSMall versions 6.0 or 6.1, this vulnerability poses a risk of unauthorized information disclosure due to improper access controls. While the impact is limited to confidentiality and does not affect data integrity or service availability, sensitive installation or configuration data could be exposed, which might facilitate further attacks or unauthorized system reconnaissance. Organizations in sectors such as e-commerce, retail, or any business relying on DSMall for online storefronts could face reputational damage and compliance issues under GDPR if sensitive customer or operational data is leaked. The remote and unauthenticated nature of the exploit increases the threat level, especially for publicly accessible DSMall installations. Given the lack of a patch, organizations must prioritize mitigating this vulnerability to prevent potential exploitation that could lead to broader security incidents.

Mitigation Recommendations

1. Immediate mitigation should include restricting access to the public/install.php file via web server configuration (e.g., using .htaccess rules or equivalent) to allow only trusted IP addresses or internal networks to access it. 2. Disable or remove the install.php script entirely after installation is complete to eliminate the attack surface. 3. Implement web application firewall (WAF) rules to detect and block suspicious HTTP GET requests targeting install.php or unusual parameter manipulations. 4. Monitor web server logs for anomalous access patterns to install.php and related endpoints to detect potential exploitation attempts. 5. Engage with DeShang vendor support or security advisories to obtain patches or updates as soon as they become available and plan for timely application. 6. Conduct a security review of access control mechanisms across the DSMall deployment to identify and remediate any other potential weaknesses. 7. Educate system administrators and developers on secure deployment practices, emphasizing the importance of removing or securing installation scripts post-deployment.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2024-01-11T10:22:45.216Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 683f034b182aa0cae27e6670

Added to database: 6/3/2025, 2:14:35 PM

Last enriched: 7/4/2025, 3:26:13 PM

Last updated: 8/18/2025, 11:28:39 PM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats