An unauthenticated client can control which host:port the proxy connects to by choosing a realm whose DNS publishes SRV records, leading to unbounded SRV auto discovery being used to make server-side connections across a trust boundary (including localhost/RFC1918) with no port/address policy and no validation of upstream responses, resulting in SSRF (CWE-918), data exfiltration, and origin-cloaked egress.
This issue has been addressed in the following products: Red Hat Enterprise Linux 10.0 Extended Update Support Via RHSA-2025:21141 https://access.redhat.com/errata/RHSA-2025:21141
This issue has been addressed in the following products: Red Hat Enterprise Linux 10 Via RHSA-2025:21142 https://access.redhat.com/errata/RHSA-2025:21142
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2025:21139 https://access.redhat.com/errata/RHSA-2025:21139
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.6 Extended Update Support Via RHSA-2025:21138 https://access.redhat.com/errata/RHSA-2025:21138
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2025:21140 https://access.redhat.com/errata/RHSA-2025:21140
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions Via RHSA-2025:21448 https://access.redhat.com/errata/RHSA-2025:21448