CVE-2025-9414

4.7 MEDIUM

📋 TL;DR

This CVE describes a Server-Side Request Forgery (SSRF) vulnerability in kodbox 1.61's download handler. Attackers can manipulate the 'url' parameter to make the server send requests to internal systems, potentially accessing sensitive data or services. All systems running kodbox 1.61 with the vulnerable component enabled are affected.

💻 Affected Systems

Products:
  • kalcaddle kodbox
Versions: 1.61
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the Download from Link Handler component at /?explorer/upload/serverDownload

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could access internal services, exfiltrate sensitive data, or pivot to internal network systems, potentially leading to full network compromise.

🟠

Likely Case

Information disclosure from internal services, metadata harvesting, or limited internal network reconnaissance.

🟢

If Mitigated

Limited impact with proper network segmentation and egress filtering, restricting what internal resources the server can access.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit details are publicly available in the provided GitHub gist. Remote exploitation is possible but may require authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: No

Instructions:

No official patch available. Check vendor website for updates or consider workarounds.

🔧 Temporary Workarounds

Disable vulnerable endpoint

all

Block or disable access to the /?explorer/upload/serverDownload endpoint

# Use web server configuration (Apache example)
<Location "/?explorer/upload/serverDownload">
    Order deny,allow
    Deny from all
</Location>
# Nginx example
location ~* /\?explorer/upload/serverDownload {
    deny all;
    return 403;
}

Input validation

all

Implement strict URL validation in the download handler

# PHP example - validate URLs before processing
if (!filter_var($url, FILTER_VALIDATE_URL)) {
    die('Invalid URL');
}
if (parse_url($url, PHP_URL_HOST) === 'internal.domain') {
    die('Internal URLs not allowed');
}

🧯 If You Can't Patch

  • Implement network segmentation to restrict server egress to only necessary external services
  • Deploy a Web Application Firewall (WAF) with SSRF protection rules

🔍 How to Verify

Check if Vulnerable:

Test if the /?explorer/upload/serverDownload endpoint accepts arbitrary URLs and makes requests to internal systems

Check Version:

Check kodbox version in admin panel or configuration files

Verify Fix Applied:

Verify the endpoint no longer processes arbitrary URLs or returns appropriate errors

📡 Detection & Monitoring

Log Indicators:

  • Unusual requests to /?explorer/upload/serverDownload with URL parameters
  • Outbound requests from server to internal IP ranges

Network Indicators:

  • Server making unexpected outbound HTTP requests
  • Traffic from server to internal services not normally accessed

SIEM Query:

source="web_server" AND (uri="/?explorer/upload/serverDownload" OR uri LIKE "%serverDownload%") AND url_parameter="*"

🔗 References

📤 Share & Export