A server-side request forgery (SSRF) vulnerability exists in the Bitdefender GravityZone Update Server when operating in Relay Mode. The HTTP proxy component on port 7074 uses a domain allowlist to restrict outbound requests, but fails to properly sanitize hostnames containing null-byte (%00) sequences. By crafting a request to a domain such as evil.com%00.bitdefender.com, an attacker can bypass the allowlist check, causing the proxy to forward requests to arbitrary external or internal systems.
References
Configurations
History
21 Aug 2025, 21:46
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.3 |
First Time |
Bitdefender
Bitdefender gravityzone Update Server |
|
CPE | cpe:2.3:a:bitdefender:gravityzone_update_server:*:*:*:*:*:*:*:* | |
References | () https://www.bitdefender.com/support/security-advisories/server-side-request-forgery-in-gravityzone-update-server-using-null-bytes-va-12646 - Vendor Advisory |
07 Apr 2025, 14:18
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
04 Apr 2025, 10:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-04-04 10:15
Updated : 2025-08-21 21:46
NVD link : CVE-2025-2245
Mitre link : CVE-2025-2245
CVE.ORG link : CVE-2025-2245
JSON object : View
Products Affected
bitdefender
- gravityzone_update_server
CWE
CWE-918
Server-Side Request Forgery (SSRF)