{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-0411","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2024-01-11T10:22:45.216Z","datePublished":"2024-01-11T16:31:04.526Z","dateUpdated":"2025-06-03T14:07:54.332Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2024-02-09T19:09:35.294Z"},"title":"DeShang DSMall HTTP GET Request install.php access control","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-284","lang":"en","description":"CWE-284 Improper Access Controls"}]}],"affected":[{"vendor":"DeShang","product":"DSMall","versions":[{"version":"6.0","status":"affected"},{"version":"6.1","status":"affected"}],"modules":["HTTP GET Request Handler"]}],"descriptions":[{"lang":"en","value":"A vulnerability was found in DeShang DSMall up to 6.1.0. It has been classified as problematic. This affects an unknown part of the file public/install.php of the component HTTP GET Request Handler. The manipulation leads to improper access controls. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-250431."},{"lang":"de","value":"Es wurde eine Schwachstelle in DeShang DSMall bis 6.1.0 ausgemacht. Sie wurde als problematisch eingestuft. Hiervon betroffen ist ein unbekannter Codeblock der Datei public/install.php der Komponente HTTP GET Request Handler. Mittels dem Manipulieren mit unbekannten Daten kann eine improper access controls-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk angegangen werden. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV3_1":{"version":"3.1","baseScore":5.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":5.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":5,"vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N"}}],"timeline":[{"time":"2024-01-11T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2024-01-11T00:00:00.000Z","lang":"en","value":"CVE reserved"},{"time":"2024-01-11T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2024-01-30T12:20:19.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"glzjin (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.250431","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.250431","tags":["signature","permissions-required"]},{"url":"https://note.zhaoj.in/share/9G6K6RBjS4M4","tags":["broken-link","exploit"]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-01T18:04:49.657Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.250431","tags":["vdb-entry","technical-description","x_transferred"]},{"url":"https://vuldb.com/?ctiid.250431","tags":["signature","permissions-required","x_transferred"]},{"url":"https://note.zhaoj.in/share/9G6K6RBjS4M4","tags":["broken-link","exploit","x_transferred"]}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-05-08T15:43:22.056432Z","id":"CVE-2024-0411","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-06-03T14:07:54.332Z"}}]}}