CVE-2025-51058

6.5 MEDIUM

📋 TL;DR

Bottinelli Informatical Vedo Suite 2024.17 has a Server-side Request Forgery (SSRF) vulnerability in its /api_vedo/video/preview endpoint. Remote authenticated attackers can exploit this to make the server send HTTP requests to arbitrary internal or external systems. This affects all installations running the vulnerable version.

💻 Affected Systems

Products:
  • Bottinelli Informatical Vedo Suite
Versions: 2024.17
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to exploit. Default installations are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could access internal services, exfiltrate sensitive data, or pivot to other systems by making the vulnerable server proxy requests to internal network resources.

🟠

Likely Case

Information disclosure from internal services, potential data exfiltration, or scanning of internal network segments.

🟢

If Mitigated

Limited to authenticated users only, with network segmentation preventing access to critical internal systems.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit code is publicly available on GitHub. Requires authenticated access to the Vedo Suite application.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2024.18 or later

Vendor Advisory: http://bottinelli.com

Restart Required: No

Instructions:

1. Check current version. 2. Download and install the latest version from Bottinelli's official website. 3. Verify the patch is applied by checking the version number.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict outbound network access from the Vedo Suite server to only necessary destinations.

Input Validation

all

Implement WAF rules or application-level validation to block SSRF attempts in the file parameter.

🧯 If You Can't Patch

  • Implement strict network segmentation to limit the Vedo server's outbound connections.
  • Monitor and alert on suspicious outbound HTTP requests from the Vedo server.

🔍 How to Verify

Check if Vulnerable:

Check if the application version is 2024.17 and test the /api_vedo/video/preview endpoint with SSRF payloads in the file parameter.

Check Version:

Check the application's admin interface or configuration files for version information.

Verify Fix Applied:

Verify the application version is 2024.18 or later and test that SSRF payloads no longer work.

📡 Detection & Monitoring

Log Indicators:

  • Unusual outbound HTTP requests from the Vedo server
  • Requests to internal IP addresses or unusual domains in access logs

Network Indicators:

  • HTTP traffic from Vedo server to unexpected internal or external destinations

SIEM Query:

source="vedo-server" AND (dest_ip IN [internal_ranges] OR dest_domain NOT IN [allowed_domains])

🔗 References

📤 Share & Export