Back

Server Side Request Forgery in GravityZone Update Server Using Null Bytes (VA-12646)

Publication date: April 4th, 2025


CVE ID:
CVE-2025-2245
CVSS scrore:
6.9 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:L/SI:L/SA:L
Affected vendors:
Bitdefender
Affected products:
GravityZone Update Server
Vulnerability details:

A server-side request forgery (SSRF) vulnerability exists in the Bitdefender GravityZone Update Server when operating in Relay Mode. The HTTP proxy component on port 7074 uses a domain allowlist to restrict outbound requests, but fails to properly sanitize hostnames containing null-byte (%00) sequences. By crafting a request to a domain such as evil.com%00.bitdefender.com, an attacker can bypass the allowlist check, causing the proxy to forward requests to arbitrary external or internal systems.

Additional details:
An automatic update to version 3.5.2.689 fixes the issue
Credit:
Nicolas Verdier (@n1nj4sec)