Executive Summary

Informations
Name CVE-2025-1211 First vendor Publication 2025-02-11
Vendor Cve Last vendor Modification 2025-03-16

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

Versions of the package hackney before 1.21.0 are vulnerable to Server-side Request Forgery (SSRF) due to improper parsing of URLs by URI built-in module and hackey. Given the URL http://127.0.0.1?@127.2.2.2/, the URI function will parse and see the host as 127.0.0.1 (which is correct), and hackney will refer the host as 127.2.2.2/. This vulnerability can be exploited when users rely on the URL function for host checking.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1211

Sources (Detail)

https://gist.github.com/snoopysecurity/996de09ec0cfd0ebdcfdda8ff515deb1
https://github.com/benoitc/hackney/commit/9594ce58fabd32cd897fc28fae937694515...
https://security.snyk.io/vuln/SNYK-HEX-HACKNEY-6516131
https://www.blackhat.com/docs/us-17/thursday/us-17-Tsai-A-New-Era-Of-SSRF-Exp...
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
Date Informations
2025-03-16 17:20:53
  • Multiple Updates
2025-02-12 03:10:21
  • Multiple Updates
2025-02-12 03:10:15
  • Multiple Updates
2025-02-11 21:20:36
  • Multiple Updates
2025-02-11 17:20:28
  • First insertion