CVE-2025-25182

9.4 CRITICAL

📋 TL;DR

This CVE describes an authentication bypass vulnerability in Stroom data platform when configured with AWS Application Load Balancer (ALB) authentication. Attackers can bypass authentication entirely and potentially perform server-side request forgery (SSRF) to access AWS metadata, which could lead to code execution or privilege escalation. Affected systems are those running vulnerable Stroom versions configured with ALB authentication that are network-accessible.

💻 Affected Systems

Products:
  • Stroom
Versions: Starting from version 7.2-beta.53 up to but not including versions 7.2.24, 7.3-beta.22, 7.4.4, and 7.5-beta.2
Operating Systems: All
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when configured with ALB Authentication integration AND the application is network accessible (not accessed exclusively through the ALB)

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise via authentication bypass leading to SSRF against AWS metadata service, resulting in AWS credential theft, code execution, and full privilege escalation within the environment.

🟠

Likely Case

Authentication bypass allowing unauthorized access to Stroom data and functionality, potentially leading to data exposure and further lateral movement within the network.

🟢

If Mitigated

Limited impact if proper network segmentation prevents direct access to vulnerable instances or if AWS metadata service is not accessible from the compromised instance.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires specific configuration (ALB auth) and network access to the vulnerable instance. The authentication bypass appears straightforward once these conditions are met.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.2.24, 7.3-beta.22, 7.4.4, or 7.5-beta.2

Vendor Advisory: https://github.com/gchq/stroom/security/advisories/GHSA-x489-xx2m-vc43

Restart Required: Yes

Instructions:

1. Identify current Stroom version. 2. Upgrade to patched version (7.2.24, 7.3-beta.22, 7.4.4, or 7.5-beta.2). 3. Restart Stroom service. 4. Verify upgrade completed successfully.

🔧 Temporary Workarounds

Network Access Restriction

all

Ensure Stroom instances are only accessible through the ALB and not directly network-accessible

Configure firewall rules to restrict direct access to Stroom ports (typically 8080)

Disable ALB Authentication

all

Temporarily disable ALB authentication integration if not strictly required

Modify Stroom configuration to use alternative authentication methods

🧯 If You Can't Patch

  • Implement strict network segmentation to prevent direct access to Stroom instances
  • Configure AWS Instance Metadata Service (IMDS) to use IMDSv2 with hop limit restrictions

🔍 How to Verify

Check if Vulnerable:

Check Stroom version and verify if ALB authentication is configured and instance is directly network accessible

Check Version:

Check Stroom web interface or application logs for version information

Verify Fix Applied:

Confirm Stroom version is 7.2.24, 7.3-beta.22, 7.4.4, or 7.5-beta.2 or higher

📡 Detection & Monitoring

Log Indicators:

  • Unexpected authentication bypass attempts
  • Requests bypassing ALB authentication headers
  • Unusual access patterns to AWS metadata endpoints

Network Indicators:

  • Direct connections to Stroom ports bypassing ALB
  • Requests to AWS metadata service from Stroom instances

SIEM Query:

source="stroom" AND (event_type="auth_failure" OR http_user_agent NOT CONTAINS "ELB-HealthChecker")

🔗 References

📤 Share & Export