CVE-2024-43022

7.5 HIGH

📋 TL;DR

This vulnerability allows attackers to perform directory traversal attacks through the downloader.php component in TOSEI online store management system. Attackers can potentially access sensitive files outside the intended directory. Affected systems include TOSEI online store management system versions 4.02, 4.03, and 4.04.

💻 Affected Systems

Products:
  • TOSEI online store management system
Versions: v4.02, v4.03, v4.04
Operating Systems: Any OS running the affected software
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the downloader.php component which appears to be part of the standard installation.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could read sensitive system files, configuration files, or source code, potentially leading to full system compromise if credentials or other critical data is exposed.

🟠

Likely Case

Unauthorized access to sensitive files containing configuration data, user information, or business data stored on the web server.

🟢

If Mitigated

Limited impact with proper file permissions and web server configuration restricting access to sensitive directories.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The GitHub gist provides technical details that could be used to create an exploit. Directory traversal vulnerabilities are typically easy to exploit.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Unknown

Restart Required: No

Instructions:

No official patch available. Check with TOSEI vendor for updates or consider upgrading to a newer version if available.

🔧 Temporary Workarounds

Input Validation and Sanitization

all

Implement proper input validation in downloader.php to prevent directory traversal sequences

Modify downloader.php to validate and sanitize user input, removing '../' sequences and restricting file access to specific directories

Web Server Configuration

all

Configure web server to restrict access to sensitive directories and implement proper file permissions

Set appropriate file permissions (e.g., chmod 644 for files, 755 for directories)
Configure web server to deny access to parent directories

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block directory traversal attempts
  • Restrict network access to the TOSEI system to trusted IP addresses only

🔍 How to Verify

Check if Vulnerable:

Test if downloader.php accepts directory traversal sequences (e.g., '../') in parameters

Check Version:

Check TOSEI system version in admin panel or configuration files

Verify Fix Applied:

Verify that directory traversal attempts are blocked and return appropriate error messages

📡 Detection & Monitoring

Log Indicators:

  • Multiple requests to downloader.php with '../' sequences
  • Access attempts to sensitive files outside web root

Network Indicators:

  • HTTP requests containing directory traversal patterns to downloader.php endpoint

SIEM Query:

web.url:*downloader.php* AND (web.uri:*../* OR web.uri:*..%2F*)

🔗 References

📤 Share & Export