Skip to main content

CVE-2024-0417: CWE-24 Path Traversal: '../filedir' in DeShang DSShop

Medium
VulnerabilityCVE-2024-0417cvecve-2024-0417cwe-24
Published: Thu Jan 11 2024 (01/11/2024, 18:00:05 UTC)
Source: CVE Database V5
Vendor/Project: DeShang
Product: DSShop

Description

A vulnerability, which was classified as critical, was found in DeShang DSShop up to 2.1.5. This affects an unknown part of the file application/home/controller/MemberAuth.php. The manipulation of the argument member_info leads to path traversal: '../filedir'. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-250437 was assigned to this vulnerability.

AI-Powered Analysis

AILast updated: 07/04/2025, 15:25:23 UTC

Technical Analysis

CVE-2024-0417 is a path traversal vulnerability identified in DeShang DSShop versions up to 2.1.5, specifically within the file application/home/controller/MemberAuth.php. The vulnerability arises due to improper validation of the 'member_info' argument, which allows an attacker to manipulate the input to include path traversal sequences such as '../filedir'. This manipulation can enable an attacker to access files and directories outside the intended scope of the application, potentially leading to unauthorized information disclosure or modification of files. The vulnerability is remotely exploitable and does not require user interaction, but it does require some level of privileges (PR:L) according to the CVSS vector, indicating that the attacker must have limited privileges or authenticated access to exploit it. The CVSS v3.1 base score is 5.4, categorized as medium severity, reflecting that while the impact on confidentiality is none, there is a low impact on integrity and availability. The vulnerability has been publicly disclosed, but there are no known exploits in the wild at this time. No official patches have been linked or published yet, which means organizations using affected versions remain at risk until a fix is applied or mitigations are implemented.

Potential Impact

For European organizations using DeShang DSShop, this vulnerability poses a moderate risk. The path traversal flaw can allow attackers with limited privileges to access or modify files outside the application directory, potentially leading to data integrity issues or service disruptions. Although confidentiality impact is rated none, the ability to alter files or disrupt availability can affect business operations, especially for e-commerce platforms relying on DSShop for customer management and transactions. This could lead to financial losses, reputational damage, and compliance issues under regulations such as GDPR if personal data is indirectly affected. The remote exploitability increases the risk profile, particularly for organizations with exposed DSShop instances. Since the vulnerability requires some level of authenticated access, insider threats or compromised credentials could be leveraged to exploit this flaw. The absence of known exploits in the wild reduces immediate risk but does not eliminate it, especially as public disclosure may encourage attackers to develop exploits.

Mitigation Recommendations

European organizations should immediately audit their DSShop installations to identify affected versions (2.1.0 through 2.1.5). Until an official patch is released, practical mitigations include: 1) Implement strict input validation and sanitization on the 'member_info' parameter to block path traversal sequences such as '../'. 2) Restrict file system permissions for the web server user to limit access to sensitive directories and files outside the application scope. 3) Employ web application firewalls (WAFs) with custom rules to detect and block path traversal attempts targeting the vulnerable parameter. 4) Monitor logs for suspicious access patterns or repeated attempts to exploit path traversal. 5) Enforce strong authentication and access controls to reduce the risk of attackers gaining the required privileges to exploit the vulnerability. 6) Isolate the DSShop application environment to minimize potential damage from exploitation. Organizations should also prepare to apply vendor patches promptly once available and consider engaging with DeShang support for interim guidance.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2024-01-11T10:23:11.293Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 683f034b182aa0cae27e6676

Added to database: 6/3/2025, 2:14:35 PM

Last enriched: 7/4/2025, 3:25:23 PM

Last updated: 8/17/2025, 9:46:57 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats