A server-side request forgery (SSRF) vulnerability exists in the Bitdefender GravityZone Update Server when operating in Relay Mode. The HTTP proxy component on port 7074 uses a domain allowlist to restrict outbound requests, but fails to properly sanitize hostnames containing null-byte (%00) sequences. By crafting a request to a domain such as evil.com%00.bitdefender.com, an attacker can bypass the allowlist check, causing the proxy to forward requests to arbitrary external or internal systems.
Metrics
Affected Vendors & Products
References
History
Fri, 04 Apr 2025 13:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 04 Apr 2025 10:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A server-side request forgery (SSRF) vulnerability exists in the Bitdefender GravityZone Update Server when operating in Relay Mode. The HTTP proxy component on port 7074 uses a domain allowlist to restrict outbound requests, but fails to properly sanitize hostnames containing null-byte (%00) sequences. By crafting a request to a domain such as evil.com%00.bitdefender.com, an attacker can bypass the allowlist check, causing the proxy to forward requests to arbitrary external or internal systems. | |
Title | Server Side Request Forgery in GravityZone Update Server Using Null Bytes (VA-12646) | |
Weaknesses | CWE-918 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: Bitdefender
Published: 2025-04-04T09:54:03.681Z
Updated: 2025-04-04T12:57:26.616Z
Reserved: 2025-03-12T11:14:14.019Z
Link: CVE-2025-2245

Updated: 2025-04-04T12:57:17.686Z

Status : Awaiting Analysis
Published: 2025-04-04T10:15:16.740
Modified: 2025-04-07T14:18:15.560
Link: CVE-2025-2245

No data.