Home

Description

EN DE

A vulnerability was found in kalcaddle kodbox 1.61. Affected by this vulnerability is an unknown functionality of the file /?explorer/upload/serverDownload of the component Download from Link Handler. Performing manipulation of the argument url results in server-side request forgery. Remote exploitation of the attack is possible. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.

Eine Schwachstelle wurde in kalcaddle kodbox 1.61 gefunden. Es geht um eine nicht näher bekannte Funktion der Datei /?explorer/upload/serverDownload der Komponente Download from Link Handler. Die Veränderung des Parameters url resultiert in server-side request forgery. Der Angriff kann über das Netzwerk angegangen werden. Der Exploit wurde der Öffentlichkeit bekannt gemacht und könnte verwendet werden.

PUBLISHED Reserved 2025-08-25 | Published 2025-08-25 | Updated 2025-08-25 | Assigner VulDB




MEDIUM: 5.1CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P
MEDIUM: 4.7CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
MEDIUM: 4.7CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
5.8AV:N/AC:L/Au:M/C:P/I:P/A:P/E:POC/RL:ND/RC:UR

Problem types

Server-Side Request Forgery

Product status

1.61
affected

Timeline

2025-08-25:Advisory disclosed
2025-08-25:VulDB entry created
2025-08-25:VulDB entry last update

Credits

AquaNight (VulDB User) reporter

References

vuldb.com/?id.321256 (VDB-321256 | kalcaddle kodbox Download from Link serverDownload server-side request forgery) vdb-entry technical-description

vuldb.com/?ctiid.321256 (VDB-321256 | CTI Indicators (IOB, IOC, IOA)) signature permissions-required

vuldb.com/?submit.633727 (Submit #633727 | KodCloud KodBox v1.61 Server-Side Request Forgery) third-party-advisory

gist.github.com/SysEternals/a03d45b582451f243f9c24076593c49c exploit

cve.org (CVE-2025-9414)

nvd.nist.gov (CVE-2025-9414)

Download JSON