A server-side request forgery (SSRF) vulnerability exists in the Bitdefender GravityZone Update Server when operating in Relay Mode. The HTTP proxy component on port 7074 uses a domain allowlist to restrict outbound requests, but fails to properly sanitize hostnames containing null-byte (%00) sequences. By crafting a request to a domain such as evil.com%00.bitdefender.com, an attacker can bypass the allowlist check, causing the proxy to forward requests to arbitrary external or internal systems.
History

Fri, 04 Apr 2025 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 04 Apr 2025 10:00:00 +0000

Type Values Removed Values Added
Description A server-side request forgery (SSRF) vulnerability exists in the Bitdefender GravityZone Update Server when operating in Relay Mode. The HTTP proxy component on port 7074 uses a domain allowlist to restrict outbound requests, but fails to properly sanitize hostnames containing null-byte (%00) sequences. By crafting a request to a domain such as evil.com%00.bitdefender.com, an attacker can bypass the allowlist check, causing the proxy to forward requests to arbitrary external or internal systems.
Title Server Side Request Forgery in GravityZone Update Server Using Null Bytes (VA-12646)
Weaknesses CWE-918
References
Metrics cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:L/SI:L/SA:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Bitdefender

Published: 2025-04-04T09:54:03.681Z

Updated: 2025-04-04T12:57:26.616Z

Reserved: 2025-03-12T11:14:14.019Z

Link: CVE-2025-2245

cve-icon Vulnrichment

Updated: 2025-04-04T12:57:17.686Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-04-04T10:15:16.740

Modified: 2025-04-07T14:18:15.560

Link: CVE-2025-2245

cve-icon Redhat

No data.