CVE-2025-36845
📋 TL;DR
This Server-Side Request Forgery (SSRF) vulnerability in Eveo URVE Web Manager allows attackers to make the application server send requests to internal network resources. Attackers can potentially access sensitive internal services, read local files, or scan internal networks. All installations of Eveo URVE Web Manager version 27.02.2025 are affected.
💻 Affected Systems
- Eveo URVE Web Manager
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of internal network through chained attacks, data exfiltration from internal services, or lateral movement to critical systems.
Likely Case
Information disclosure from internal services, internal network scanning, or accessing metadata services in cloud environments.
If Mitigated
Limited to external resource probing if proper network segmentation and input validation are in place.
🎯 Exploit Status
SSRF vulnerabilities are commonly exploited and tools exist for automated exploitation.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: https://smartoffice.expert/en
Restart Required: No
Instructions:
Check vendor website for security updates. If patch available: 1. Backup current installation 2. Apply vendor-provided patch 3. Test functionality 4. Monitor for issues
🔧 Temporary Workarounds
Block vulnerable endpoint
allRestrict access to /_internal/redirect.php endpoint
# Apache: RewriteRule ^/_internal/redirect\.php$ - [F,L]
# Nginx: location ~ ^/_internal/redirect\.php$ { deny all; }
Input validation at WAF
allImplement SSRF protection rules in web application firewall
# ModSecurity rule: SecRule ARGS "@rx ^(http|https)://" "id:1001,phase:2,deny,msg:'SSRF attempt detected'"
🧯 If You Can't Patch
- Implement strict network segmentation to limit application server's internal network access
- Deploy web application firewall with SSRF detection rules
🔍 How to Verify
Check if Vulnerable:
Test if /_internal/redirect.php endpoint accepts URL parameters and returns external content. Example: curl 'http://target/_internal/redirect.php?url=http://example.com'
Check Version:
Check application version in admin interface or configuration files
Verify Fix Applied:
Verify endpoint no longer processes external URLs or returns error. Test with same curl command expecting failure.
📡 Detection & Monitoring
Log Indicators:
- Requests to /_internal/redirect.php with URL parameters
- Outbound connections from application server to unusual internal IPs
Network Indicators:
- Application server making unexpected HTTP requests to internal services
- Traffic patterns showing scanning behavior from application server
SIEM Query:
source="web_logs" AND uri="/_internal/redirect.php" AND query_string="*url=*"