S4E Mobile Logo

CVE-2025-36845 Scanner

CVE-2025-36845 Scanner - Server-Side-Request-Forgery (SSRF) vulnerability in Eveo URVE Web Manager

Short Info


Level

High

Single Scan

Single Scan

Can be used by

Asset Owner

Estimated Time

1 minute

Time Interval

15 days 1 hour

Scan only one

URL

Toolbox

The Eveo URVE Web Manager is a popular software used in various industries for managing digital signage and information display systems. It is typically utilized by businesses and institutions to streamline their communication and display management processes. This software enables users to control and schedule content delivery across numerous screens and locations. Its ease of integration with existing systems makes it a preferred choice for IT managers and network administrators. With robust features, it is designed to provide efficient content management and delivery to a wide audience. Its flexibility and scalability suit the varied needs of different organizational setups, from small enterprises to large corporations.

The vulnerability detected, Server-Side-Request-Forgery (SSRF), can allow attackers to make unauthorized requests from the server. SSRF vulnerabilities occur when attackers can input or manipulate URLs, leading the server to initiate requests to internal or unintended hosts on the network. This could potentially expose internal services, data, or even infrastructure that should be inaccessible. In the case of Eveo URVE Web Manager, the SSRF vulnerability is due to improper validation of URL inputs within a specific file. It represents a significant security risk as attackers may gain insights into internal network topology or exploit other vulnerabilities.

Technically, the vulnerability exists in the handling of URL input within the "/_internal/redirect.php" endpoint. The improper validation of these URLs means that an attacker can craft a URL input that forces the server to make requests to otherwise restricted internal endpoints. This SSRF vulnerability could be exploited by manipulating the URL in a crafted request to interact with unintended services. Employing a crafted URL input, attackers can direct the server to engage with protocols such as DNS, potentially revealing information or causing other problems.

The exploitation of this vulnerability can result in various negative consequences. Attackers could access sensitive internal services or data not meant for exposure to the public internet. This can lead to data breaches where confidential information is extracted and misused. There is also the potential for attackers to use this foothold to launch further attacks or widen their access within the affected network. The integrity and confidentiality of the internal network services could be severely compromised, leading to financial loss and reputational damage for affected organizations.

REFERENCES

Get started to protecting your digital assets