Skip to main content

CVE-2024-1163: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in mbloch mbloch/mapshaper

High
VulnerabilityCVE-2024-1163cvecve-2024-1163cwe-22
Published: Tue Feb 13 2024 (02/13/2024, 14:36:26 UTC)
Source: CVE
Vendor/Project: mbloch
Product: mbloch/mapshaper

Description

The attacker may exploit a path traversal vulnerability leading to information disclosure.

AI-Powered Analysis

AILast updated: 07/05/2025, 00:55:35 UTC

Technical Analysis

CVE-2024-1163 is a high-severity vulnerability classified under CWE-22, which pertains to improper limitation of a pathname to a restricted directory, commonly known as a path traversal vulnerability. This vulnerability affects the mbloch/mapshaper software, a tool used for processing and simplifying geographic data files. The flaw allows an attacker to manipulate file path inputs to access files and directories outside the intended restricted directory scope. Exploiting this vulnerability can lead to unauthorized information disclosure, as the attacker may read sensitive files on the system that should otherwise be inaccessible. According to the CVSS 3.0 vector (AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H), the attack requires local access (AV:L), but no privileges (PR:N) or user interaction (UI:N) are needed, making it easier to exploit once local access is obtained. The impact on confidentiality is high due to potential exposure of sensitive data, and availability is also affected, indicating possible disruption or denial of service. The vulnerability has been publicly disclosed but no known exploits are currently reported in the wild, and no patches have been linked yet. The affected versions are unspecified, which suggests that users of any version of mbloch/mapshaper should consider themselves potentially vulnerable until confirmed otherwise. The vulnerability was published on February 13, 2024, and has been enriched by CISA, indicating recognition by cybersecurity authorities.

Potential Impact

For European organizations, the impact of CVE-2024-1163 can be significant, especially for those relying on mbloch/mapshaper for geographic data processing, such as GIS service providers, urban planning agencies, environmental monitoring organizations, and companies involved in logistics and transportation. Unauthorized disclosure of sensitive geographic or operational data could lead to privacy violations, competitive disadvantages, or regulatory non-compliance under GDPR if personal or sensitive data is exposed. Additionally, the availability impact could disrupt critical workflows dependent on mapshaper processing, potentially affecting decision-making and operational continuity. Since exploitation requires local access, the threat is more pronounced in environments where multiple users share systems or where attackers can gain initial footholds through other means. The lack of patches increases the urgency for organizations to implement mitigating controls. Given the strategic importance of geographic data in sectors such as defense, infrastructure, and emergency services, exploitation could have broader implications for national security and public safety in Europe.

Mitigation Recommendations

To mitigate CVE-2024-1163, European organizations should first inventory their use of mbloch/mapshaper and identify all instances where it is deployed. Until an official patch is released, organizations should restrict local access to systems running mapshaper to trusted users only, employing strict access controls and monitoring for suspicious activity. Implementing application whitelisting and sandboxing can limit the ability of attackers to exploit the vulnerability. Additionally, organizations should consider isolating mapshaper processing environments from sensitive data repositories to minimize potential exposure. Regularly auditing file system permissions and employing intrusion detection systems to detect unusual file access patterns can help identify exploitation attempts early. Organizations should also stay informed about updates from the vendor or security advisories to apply patches promptly once available. Finally, incorporating this vulnerability into incident response plans and conducting tabletop exercises can prepare teams to respond effectively if exploitation occurs.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
@huntr_ai
Date Reserved
2024-02-01T17:02:34.186Z
Cisa Enriched
true
Cvss Version
3.0
State
PUBLISHED

Threat ID: 682d9817c4522896dcbd75e7

Added to database: 5/21/2025, 9:08:39 AM

Last enriched: 7/5/2025, 12:55:35 AM

Last updated: 7/31/2025, 8:30:21 AM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats