HCL DevOps Deploy, Authentication Bypass, CVE-2025-0257 (Critical)

How CVE-2025-0257 Works

The vulnerability in HCL DevOps Deploy (formerly HCL Launch) arises due to insufficient authentication checks in the Agent Relay service. Attackers can exploit this flaw by sending crafted requests to the service, bypassing authentication mechanisms. This allows unauthorized access to internal services, potentially exposing sensitive deployment data, credentials, or enabling arbitrary code execution. The Agent Relay component fails to validate session tokens or enforce proper access controls, permitting unauthenticated users to interact with restricted APIs. The CVSS 4.0 base score reflects a critical severity due to the low attack complexity and high impact on confidentiality, integrity, and availability.

DailyCVE Form:

Platform: HCL DevOps Deploy
Version: Pre-10.1.2
Vulnerability: Authentication Bypass
Severity: Critical
Date: 04/10/2025

What Undercode Say:

Exploitation:

  1. Reconnaissance: Identify exposed Agent Relay services (default port 7916).
  2. Craft Malicious Request: Send unauthenticated HTTP POST to `/agentrelay/api` endpoints.
  3. Leverage API Endpoints: Access deployment logs, inject malicious payloads, or exfiltrate secrets.
    curl -X POST http://<target>:7916/agentrelay/api/deploy -d '{"action":"execute","command":"id"}'
    

Mitigation:

  1. Patch Immediately: Upgrade to HCL DevOps Deploy 10.1.2 or later.
  2. Network Controls: Restrict Agent Relay service to trusted IPs.
  3. Log Monitoring: Alert on unauthorized API access attempts.
    Example Nginx ACL
    location /agentrelay/ {
    deny all;
    allow 192.168.1.0/24;
    }
    

Detection:

import requests
vuln_endpoints = ["/api/deploy", "/api/secrets"]
for endpoint in vuln_endpoints:
r = requests.post(f"http://target:7916{endpoint}", verify=False)
if r.status_code == 200:
print(f"Vulnerable: {endpoint}")

Post-Exploitation:

  • Extract `.env` files or `config.yaml` for credentials.
  • Abuse deployment pipelines to escalate privileges.

References:

References:

Reported By: https://nvd.nist.gov/vuln/detail/CVE-2025-0257
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top