Skip to main content

CVE-2024-0416: CWE-24 Path Traversal: '../filedir' in DeShang DSMall

Medium
VulnerabilityCVE-2024-0416cvecve-2024-0416cwe-24
Published: Thu Jan 11 2024 (01/11/2024, 17:31:05 UTC)
Source: CVE
Vendor/Project: DeShang
Product: DSMall

Description

A vulnerability, which was classified as critical, has been found in DeShang DSMall up to 5.0.3. Affected by this issue is some unknown functionality of the file application/home/controller/MemberAuth.php. The manipulation of the argument file_name leads to path traversal: '../filedir'. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-250436.

AI-Powered Analysis

AILast updated: 07/06/2025, 13:55:10 UTC

Technical Analysis

CVE-2024-0416 is a path traversal vulnerability identified in DeShang DSMall versions up to 5.0.3. The issue resides in the file application/home/controller/MemberAuth.php, where the 'file_name' parameter is improperly sanitized, allowing an attacker to manipulate the input with sequences such as '../filedir' to traverse directories outside the intended file path. This vulnerability enables an attacker to access files and directories on the server that should be restricted, potentially leading to unauthorized information disclosure or modification of files. The vulnerability can be exploited remotely without user interaction but requires some level of privileges (PR:L) as indicated by the CVSS vector. The CVSS score is 5.4 (medium severity), reflecting that while confidentiality impact is none, integrity and availability impacts are low to medium. No public exploit is currently known in the wild, but the exploit details have been disclosed publicly, increasing the risk of exploitation. The vulnerability is classified under CWE-24 (Path Traversal), a common and critical web application security issue that can lead to significant security breaches if exploited. Lack of available patches at the time of reporting increases the urgency for mitigation.

Potential Impact

For European organizations using DeShang DSMall e-commerce platforms, this vulnerability poses a moderate risk. Exploitation could allow attackers to read or modify sensitive files on the server, potentially leading to data integrity issues or denial of service through file manipulation. Although confidentiality impact is rated none, the ability to alter files or disrupt service can affect business operations and customer trust. Organizations handling personal data under GDPR must be cautious, as unauthorized file access or modification could lead to compliance violations and regulatory penalties. The remote exploitability without user interaction increases the threat surface, especially for internet-facing installations. Given the medium CVSS score, the impact is significant enough to warrant prompt attention but is not immediately critical unless combined with other vulnerabilities or misconfigurations.

Mitigation Recommendations

European organizations should immediately audit their DSMall installations to identify affected versions (5.0.0 through 5.0.3). Until an official patch is released, implement strict input validation and sanitization on the 'file_name' parameter to prevent directory traversal sequences. Employ web application firewalls (WAFs) with custom rules to detect and block path traversal attempts targeting MemberAuth.php. Restrict file system permissions for the web server user to limit access to sensitive directories and files, minimizing potential damage from exploitation. Monitor logs for suspicious requests containing '../' patterns or unusual file access attempts. Consider isolating the DSMall application in a sandboxed environment or container to reduce impact scope. Stay updated with vendor advisories for patches or official fixes and apply them promptly once available. Conduct penetration testing focused on path traversal vectors to verify the effectiveness of mitigations.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2024-01-11T10:23:06.247Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fb1484d88663aec8c0

Added to database: 5/20/2025, 6:59:07 PM

Last enriched: 7/6/2025, 1:55:10 PM

Last updated: 8/11/2025, 10:13:06 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats