CVE-2025-1211: Server-side Request Forgery (SSRF) in hackney
6.5
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.3023%
CWE
Published
2/11/2025
Updated
2/20/2025
KEV Status
No
Technology
Erlang
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| hackney | erlang | < 1.21.0 | 1.21.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from URL parsing order inconsistencies between URI module and Hackney. The commit diff shows critical changes to parse_url/2 logic:- 1) Renamed parse_fragment -> cut_fragment- 2) Added cut_query processing before path splitting- 3) Modified raw_path construction. The original implementation parsed fragments first (allowing '@' in queries to affect host resolution), while the patched version processes queries before userinfo. The test case added for 'http://127.0.0.1?@127.2.2.2/' confirms this was the exploitation vector.