CVE-2024-0416: CWE-24 Path Traversal: '../filedir' in DeShang DSMall
A vulnerability, which was classified as critical, has been found in DeShang DSMall up to 5.0.3. Affected by this issue is some unknown functionality of the file application/home/controller/MemberAuth.php. The manipulation of the argument file_name leads to path traversal: '../filedir'. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-250436.
AI Analysis
Technical Summary
CVE-2024-0416 is a path traversal vulnerability identified in DeShang DSMall versions up to 5.0.3. The issue resides in the file application/home/controller/MemberAuth.php, where the 'file_name' parameter is improperly sanitized, allowing an attacker to manipulate the input with sequences such as '../filedir' to traverse directories outside the intended file path. This vulnerability enables an attacker to access files and directories on the server that should be restricted, potentially leading to unauthorized information disclosure or modification of files. The vulnerability can be exploited remotely without user interaction but requires some level of privileges (PR:L) as indicated by the CVSS vector. The CVSS score is 5.4 (medium severity), reflecting that while confidentiality impact is none, integrity and availability impacts are low to medium. No public exploit is currently known in the wild, but the exploit details have been disclosed publicly, increasing the risk of exploitation. The vulnerability is classified under CWE-24 (Path Traversal), a common and critical web application security issue that can lead to significant security breaches if exploited. Lack of available patches at the time of reporting increases the urgency for mitigation.
Potential Impact
For European organizations using DeShang DSMall e-commerce platforms, this vulnerability poses a moderate risk. Exploitation could allow attackers to read or modify sensitive files on the server, potentially leading to data integrity issues or denial of service through file manipulation. Although confidentiality impact is rated none, the ability to alter files or disrupt service can affect business operations and customer trust. Organizations handling personal data under GDPR must be cautious, as unauthorized file access or modification could lead to compliance violations and regulatory penalties. The remote exploitability without user interaction increases the threat surface, especially for internet-facing installations. Given the medium CVSS score, the impact is significant enough to warrant prompt attention but is not immediately critical unless combined with other vulnerabilities or misconfigurations.
Mitigation Recommendations
European organizations should immediately audit their DSMall installations to identify affected versions (5.0.0 through 5.0.3). Until an official patch is released, implement strict input validation and sanitization on the 'file_name' parameter to prevent directory traversal sequences. Employ web application firewalls (WAFs) with custom rules to detect and block path traversal attempts targeting MemberAuth.php. Restrict file system permissions for the web server user to limit access to sensitive directories and files, minimizing potential damage from exploitation. Monitor logs for suspicious requests containing '../' patterns or unusual file access attempts. Consider isolating the DSMall application in a sandboxed environment or container to reduce impact scope. Stay updated with vendor advisories for patches or official fixes and apply them promptly once available. Conduct penetration testing focused on path traversal vectors to verify the effectiveness of mitigations.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2024-0416: CWE-24 Path Traversal: '../filedir' in DeShang DSMall
Description
A vulnerability, which was classified as critical, has been found in DeShang DSMall up to 5.0.3. Affected by this issue is some unknown functionality of the file application/home/controller/MemberAuth.php. The manipulation of the argument file_name leads to path traversal: '../filedir'. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-250436.
AI-Powered Analysis
Technical Analysis
CVE-2024-0416 is a path traversal vulnerability identified in DeShang DSMall versions up to 5.0.3. The issue resides in the file application/home/controller/MemberAuth.php, where the 'file_name' parameter is improperly sanitized, allowing an attacker to manipulate the input with sequences such as '../filedir' to traverse directories outside the intended file path. This vulnerability enables an attacker to access files and directories on the server that should be restricted, potentially leading to unauthorized information disclosure or modification of files. The vulnerability can be exploited remotely without user interaction but requires some level of privileges (PR:L) as indicated by the CVSS vector. The CVSS score is 5.4 (medium severity), reflecting that while confidentiality impact is none, integrity and availability impacts are low to medium. No public exploit is currently known in the wild, but the exploit details have been disclosed publicly, increasing the risk of exploitation. The vulnerability is classified under CWE-24 (Path Traversal), a common and critical web application security issue that can lead to significant security breaches if exploited. Lack of available patches at the time of reporting increases the urgency for mitigation.
Potential Impact
For European organizations using DeShang DSMall e-commerce platforms, this vulnerability poses a moderate risk. Exploitation could allow attackers to read or modify sensitive files on the server, potentially leading to data integrity issues or denial of service through file manipulation. Although confidentiality impact is rated none, the ability to alter files or disrupt service can affect business operations and customer trust. Organizations handling personal data under GDPR must be cautious, as unauthorized file access or modification could lead to compliance violations and regulatory penalties. The remote exploitability without user interaction increases the threat surface, especially for internet-facing installations. Given the medium CVSS score, the impact is significant enough to warrant prompt attention but is not immediately critical unless combined with other vulnerabilities or misconfigurations.
Mitigation Recommendations
European organizations should immediately audit their DSMall installations to identify affected versions (5.0.0 through 5.0.3). Until an official patch is released, implement strict input validation and sanitization on the 'file_name' parameter to prevent directory traversal sequences. Employ web application firewalls (WAFs) with custom rules to detect and block path traversal attempts targeting MemberAuth.php. Restrict file system permissions for the web server user to limit access to sensitive directories and files, minimizing potential damage from exploitation. Monitor logs for suspicious requests containing '../' patterns or unusual file access attempts. Consider isolating the DSMall application in a sandboxed environment or container to reduce impact scope. Stay updated with vendor advisories for patches or official fixes and apply them promptly once available. Conduct penetration testing focused on path traversal vectors to verify the effectiveness of mitigations.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2024-01-11T10:23:06.247Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0fb1484d88663aec8c0
Added to database: 5/20/2025, 6:59:07 PM
Last enriched: 7/6/2025, 1:55:10 PM
Last updated: 8/11/2025, 10:13:06 PM
Views: 12
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.