CVE-2024-0989: CWE-24 Path Traversal: '../filedir' in Sichuan Yougou Technology KuERP
A vulnerability, which was classified as problematic, has been found in Sichuan Yougou Technology KuERP up to 1.0.4. Affected by this issue is the function del_sn_db of the file /application/index/controller/Service.php. The manipulation of the argument file leads to path traversal: '../filedir'. The exploit has been disclosed to the public and may be used. VDB-252254 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2024-0989 is a path traversal vulnerability identified in Sichuan Yougou Technology's KuERP software versions 1.0.0 through 1.0.4. The vulnerability exists in the del_sn_db function within the /application/index/controller/Service.php file. Specifically, the issue arises from improper validation of the 'file' argument, which allows an attacker to manipulate the input with '../filedir' sequences to traverse directories outside the intended file path. This can lead to unauthorized access or deletion of files on the server. The vulnerability is classified under CWE-24 (Improper Restriction of File Name or Path), indicating a failure to properly sanitize user-supplied file paths. The CVSS v3.1 base score is 5.4 (medium severity), with the vector AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L, meaning the attack requires adjacent network access (e.g., local network), has low attack complexity, requires no privileges or user interaction, and impacts integrity and availability but not confidentiality. The vendor was notified but did not respond, and no patches or mitigations have been published yet. Although no known exploits are currently reported in the wild, the public disclosure of the vulnerability and its exploitability make it a credible threat. Attackers could leverage this vulnerability to delete or modify critical files, potentially disrupting ERP operations or causing data loss.
Potential Impact
For European organizations using KuERP, this vulnerability poses a risk to the integrity and availability of their ERP system data. Exploitation could allow attackers to delete or alter files critical to business operations, leading to operational downtime, financial losses, and potential regulatory compliance issues, especially under GDPR if data integrity is compromised. Since KuERP is an enterprise resource planning system, disruption could affect supply chain management, financial reporting, and other core business functions. The medium CVSS score reflects moderate risk, but the lack of vendor response and patches increases exposure. Organizations with KuERP installations accessible over local or adjacent networks are particularly vulnerable. Given the potential for file deletion or modification, attackers could also use this as a foothold to escalate attacks or disrupt services. The absence of confidentiality impact reduces risk of data leakage, but integrity and availability impacts remain significant for business continuity.
Mitigation Recommendations
1. Immediate mitigation should include restricting network access to the KuERP application to trusted hosts only, ideally isolating it within a secure network segment to prevent adjacent network attackers. 2. Implement strict input validation and sanitization on the 'file' parameter at the application level to prevent path traversal sequences such as '../'. 3. Employ web application firewalls (WAFs) with custom rules to detect and block path traversal attempts targeting the del_sn_db function or related endpoints. 4. Regularly monitor application logs for suspicious file path manipulation attempts. 5. If possible, disable or restrict the del_sn_db function until a vendor patch is available. 6. Maintain offline backups of critical ERP data to enable recovery in case of file deletion or corruption. 7. Engage with the vendor or community to track patch releases or unofficial fixes. 8. Conduct penetration testing focused on path traversal to identify other potential vulnerable endpoints. These steps go beyond generic advice by focusing on network segmentation, application-level filtering, and proactive monitoring tailored to this specific vulnerability and product.
Affected Countries
Germany, France, Italy, Spain, Netherlands, Poland, United Kingdom
CVE-2024-0989: CWE-24 Path Traversal: '../filedir' in Sichuan Yougou Technology KuERP
Description
A vulnerability, which was classified as problematic, has been found in Sichuan Yougou Technology KuERP up to 1.0.4. Affected by this issue is the function del_sn_db of the file /application/index/controller/Service.php. The manipulation of the argument file leads to path traversal: '../filedir'. The exploit has been disclosed to the public and may be used. VDB-252254 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2024-0989 is a path traversal vulnerability identified in Sichuan Yougou Technology's KuERP software versions 1.0.0 through 1.0.4. The vulnerability exists in the del_sn_db function within the /application/index/controller/Service.php file. Specifically, the issue arises from improper validation of the 'file' argument, which allows an attacker to manipulate the input with '../filedir' sequences to traverse directories outside the intended file path. This can lead to unauthorized access or deletion of files on the server. The vulnerability is classified under CWE-24 (Improper Restriction of File Name or Path), indicating a failure to properly sanitize user-supplied file paths. The CVSS v3.1 base score is 5.4 (medium severity), with the vector AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L, meaning the attack requires adjacent network access (e.g., local network), has low attack complexity, requires no privileges or user interaction, and impacts integrity and availability but not confidentiality. The vendor was notified but did not respond, and no patches or mitigations have been published yet. Although no known exploits are currently reported in the wild, the public disclosure of the vulnerability and its exploitability make it a credible threat. Attackers could leverage this vulnerability to delete or modify critical files, potentially disrupting ERP operations or causing data loss.
Potential Impact
For European organizations using KuERP, this vulnerability poses a risk to the integrity and availability of their ERP system data. Exploitation could allow attackers to delete or alter files critical to business operations, leading to operational downtime, financial losses, and potential regulatory compliance issues, especially under GDPR if data integrity is compromised. Since KuERP is an enterprise resource planning system, disruption could affect supply chain management, financial reporting, and other core business functions. The medium CVSS score reflects moderate risk, but the lack of vendor response and patches increases exposure. Organizations with KuERP installations accessible over local or adjacent networks are particularly vulnerable. Given the potential for file deletion or modification, attackers could also use this as a foothold to escalate attacks or disrupt services. The absence of confidentiality impact reduces risk of data leakage, but integrity and availability impacts remain significant for business continuity.
Mitigation Recommendations
1. Immediate mitigation should include restricting network access to the KuERP application to trusted hosts only, ideally isolating it within a secure network segment to prevent adjacent network attackers. 2. Implement strict input validation and sanitization on the 'file' parameter at the application level to prevent path traversal sequences such as '../'. 3. Employ web application firewalls (WAFs) with custom rules to detect and block path traversal attempts targeting the del_sn_db function or related endpoints. 4. Regularly monitor application logs for suspicious file path manipulation attempts. 5. If possible, disable or restrict the del_sn_db function until a vendor patch is available. 6. Maintain offline backups of critical ERP data to enable recovery in case of file deletion or corruption. 7. Engage with the vendor or community to track patch releases or unofficial fixes. 8. Conduct penetration testing focused on path traversal to identify other potential vulnerable endpoints. These steps go beyond generic advice by focusing on network segmentation, application-level filtering, and proactive monitoring tailored to this specific vulnerability and product.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2024-01-28T15:27:41.076Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68387d4f182aa0cae28316e8
Added to database: 5/29/2025, 3:29:19 PM
Last enriched: 7/7/2025, 11:43:00 PM
Last updated: 7/29/2025, 2:17:54 PM
Views: 10
Related Threats
CVE-2025-8983: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumCVE-2025-8982: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumCVE-2025-8981: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumCVE-2025-50862: n/a
MediumCVE-2025-50861: n/a
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.