CVE-2025-44043: n/a
Keyoti SearchUnit prior to 9.0.0. is vulnerable to Server-Side Request Forgery (SSRF) in /Keyoti_SearchEngine_Web_Common/SearchService.svc/GetResults and /Keyoti_SearchEngine_Web_Common/SearchService.svc/GetLocationAndContentCategories. An attacker can specify their own SMB server as the indexDirectory value when making POST requests to the affected components. In doing so an attacker can get the SearchUnit server to read and write configuration and log files from/to the attackers server.
AI Analysis
Technical Summary
CVE-2025-44043 is a Server-Side Request Forgery (SSRF) vulnerability affecting Keyoti SearchUnit versions prior to 9.0.0. The vulnerability exists in the SearchUnit's web service endpoints /Keyoti_SearchEngine_Web_Common/SearchService.svc/GetResults and /Keyoti_SearchEngine_Web_Common/SearchService.svc/GetLocationAndContentCategories. An attacker can exploit this flaw by sending a specially crafted POST request with the indexDirectory parameter set to an attacker-controlled SMB server. This causes the vulnerable SearchUnit server to interact with the attacker's SMB server, effectively allowing the attacker to read from and write to configuration and log files on the SearchUnit server. This can lead to unauthorized disclosure of sensitive information and potential manipulation of the server's configuration or logs. The vulnerability is classified under CWE-918 (Server-Side Request Forgery), which involves an attacker inducing the server to make HTTP or other protocol requests to unintended locations. The CVSS v3.1 base score is 5.4 (medium severity), reflecting that the attack can be performed remotely without authentication (AV:N/AC:L/PR:N), but requires user interaction (UI:R) and results in limited confidentiality and integrity impact (C:L/I:L/A:N). No known exploits are currently reported in the wild, and no patches or vendor advisories are listed at this time. The vulnerability could be leveraged in targeted attacks to gain further foothold or gather intelligence on internal network resources by abusing the server's ability to access SMB shares specified by the attacker.
Potential Impact
For European organizations using Keyoti SearchUnit prior to version 9.0.0, this SSRF vulnerability poses a moderate risk. Exploitation could lead to unauthorized access to sensitive configuration and log files, potentially exposing internal network details, user data, or operational information. This could facilitate further attacks such as lateral movement, privilege escalation, or data exfiltration. The ability to write files via SMB could allow attackers to manipulate logs to cover tracks or alter configurations to weaken security controls. Given the medium CVSS score and the need for user interaction, the threat is less likely to cause widespread automated compromise but remains significant for targeted attacks, especially in sectors with sensitive data such as finance, healthcare, and government. The impact on availability is minimal, but confidentiality and integrity risks are notable. European organizations with strict data protection regulations (e.g., GDPR) must consider the potential compliance implications of data exposure or unauthorized modifications resulting from exploitation.
Mitigation Recommendations
1. Upgrade Keyoti SearchUnit to version 9.0.0 or later where this vulnerability is addressed. 2. If immediate upgrade is not feasible, implement network-level controls to restrict outbound SMB traffic from the SearchUnit server to untrusted networks or hosts. 3. Employ web application firewalls (WAFs) to detect and block suspicious POST requests targeting the vulnerable endpoints, especially those containing SMB paths in the indexDirectory parameter. 4. Conduct thorough logging and monitoring of SearchUnit server network activity, focusing on unusual SMB connections or configuration file changes. 5. Restrict permissions on configuration and log files to minimize the impact of unauthorized read/write operations. 6. Educate users about the risks of interacting with untrusted content that might trigger SSRF attacks requiring user interaction. 7. Regularly audit and review SearchUnit server configurations and access controls to detect anomalies. 8. Consider network segmentation to isolate SearchUnit servers from sensitive internal resources and SMB shares.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Italy
CVE-2025-44043: n/a
Description
Keyoti SearchUnit prior to 9.0.0. is vulnerable to Server-Side Request Forgery (SSRF) in /Keyoti_SearchEngine_Web_Common/SearchService.svc/GetResults and /Keyoti_SearchEngine_Web_Common/SearchService.svc/GetLocationAndContentCategories. An attacker can specify their own SMB server as the indexDirectory value when making POST requests to the affected components. In doing so an attacker can get the SearchUnit server to read and write configuration and log files from/to the attackers server.
AI-Powered Analysis
Technical Analysis
CVE-2025-44043 is a Server-Side Request Forgery (SSRF) vulnerability affecting Keyoti SearchUnit versions prior to 9.0.0. The vulnerability exists in the SearchUnit's web service endpoints /Keyoti_SearchEngine_Web_Common/SearchService.svc/GetResults and /Keyoti_SearchEngine_Web_Common/SearchService.svc/GetLocationAndContentCategories. An attacker can exploit this flaw by sending a specially crafted POST request with the indexDirectory parameter set to an attacker-controlled SMB server. This causes the vulnerable SearchUnit server to interact with the attacker's SMB server, effectively allowing the attacker to read from and write to configuration and log files on the SearchUnit server. This can lead to unauthorized disclosure of sensitive information and potential manipulation of the server's configuration or logs. The vulnerability is classified under CWE-918 (Server-Side Request Forgery), which involves an attacker inducing the server to make HTTP or other protocol requests to unintended locations. The CVSS v3.1 base score is 5.4 (medium severity), reflecting that the attack can be performed remotely without authentication (AV:N/AC:L/PR:N), but requires user interaction (UI:R) and results in limited confidentiality and integrity impact (C:L/I:L/A:N). No known exploits are currently reported in the wild, and no patches or vendor advisories are listed at this time. The vulnerability could be leveraged in targeted attacks to gain further foothold or gather intelligence on internal network resources by abusing the server's ability to access SMB shares specified by the attacker.
Potential Impact
For European organizations using Keyoti SearchUnit prior to version 9.0.0, this SSRF vulnerability poses a moderate risk. Exploitation could lead to unauthorized access to sensitive configuration and log files, potentially exposing internal network details, user data, or operational information. This could facilitate further attacks such as lateral movement, privilege escalation, or data exfiltration. The ability to write files via SMB could allow attackers to manipulate logs to cover tracks or alter configurations to weaken security controls. Given the medium CVSS score and the need for user interaction, the threat is less likely to cause widespread automated compromise but remains significant for targeted attacks, especially in sectors with sensitive data such as finance, healthcare, and government. The impact on availability is minimal, but confidentiality and integrity risks are notable. European organizations with strict data protection regulations (e.g., GDPR) must consider the potential compliance implications of data exposure or unauthorized modifications resulting from exploitation.
Mitigation Recommendations
1. Upgrade Keyoti SearchUnit to version 9.0.0 or later where this vulnerability is addressed. 2. If immediate upgrade is not feasible, implement network-level controls to restrict outbound SMB traffic from the SearchUnit server to untrusted networks or hosts. 3. Employ web application firewalls (WAFs) to detect and block suspicious POST requests targeting the vulnerable endpoints, especially those containing SMB paths in the indexDirectory parameter. 4. Conduct thorough logging and monitoring of SearchUnit server network activity, focusing on unusual SMB connections or configuration file changes. 5. Restrict permissions on configuration and log files to minimize the impact of unauthorized read/write operations. 6. Educate users about the risks of interacting with untrusted content that might trigger SSRF attacks requiring user interaction. 7. Regularly audit and review SearchUnit server configurations and access controls to detect anomalies. 8. Consider network segmentation to isolate SearchUnit servers from sensitive internal resources and SMB shares.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-04-22T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 68487f541b0bd07c3938a1aa
Added to database: 6/10/2025, 6:54:12 PM
Last enriched: 7/11/2025, 12:18:17 AM
Last updated: 8/11/2025, 11:47:15 PM
Views: 17
Related Threats
CVE-2025-43732: CWE-639 Authorization Bypass Through User-Controlled Key in Liferay Portal
MediumCVE-2025-9103: Cross Site Scripting in ZenCart
MediumCVE-2025-41242: Vulnerability in VMware Spring Framework
MediumCVE-2025-47206: CWE-787 in QNAP Systems Inc. File Station 5
HighCVE-2025-5296: CWE-59 Improper Link Resolution Before File Access ('Link Following') in Schneider Electric SESU
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.