<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>CVE-2025-12874 on SRA Labs</title>
    <link>https://labs.sra.io/tags/cve-2025-12874/</link>
    <description>Recent content in CVE-2025-12874 on SRA Labs</description>
    <generator>Hugo -- gohugo.io</generator>
    <language>en-us</language>
    <lastBuildDate>Fri, 19 Dec 2025 12:00:00 +0000</lastBuildDate><atom:link href="https://labs.sra.io/tags/cve-2025-12874/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Quest Coexistence Manager for Notes</title>
      <link>https://labs.sra.io/posts/questcoexistence/</link>
      <pubDate>Fri, 19 Dec 2025 12:00:00 +0000</pubDate>
      
      <guid>https://labs.sra.io/posts/questcoexistence/</guid>
      <description>&lt;h1 id=&#34;summary&#34;&gt;Summary&lt;/h1&gt;
&lt;p&gt;SRA has identified a vulnerability in Quest Coexistence Manager for Notes that can lead to bypassing access controls, poisoning web caches, hijacking sessions, or triggering unintended internal requests.&lt;/p&gt;
&lt;h1 id=&#34;cve-identifiers&#34;&gt;CVE Identifiers&lt;/h1&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;CVE ID&lt;/th&gt;
          &lt;th&gt;CVE Name&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;CVE-2025-12874&lt;/td&gt;
          &lt;td&gt;HTTP Request Smuggling in Quest Coexistence Manager for Notes&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h1 id=&#34;vulnerability-details--description&#34;&gt;Vulnerability Details / Description&lt;/h1&gt;
&lt;p&gt;Quest Coexistence Manager for Notes (3.8.2045) is vulnerable in the Free/Busy Connector to HTTP request smuggling from an unauthenticated remote attacker. The front-end and back-end components rely on inconsistent header parsing, resulting in desynchronized request boundaries. In this case, the front-end server uses the &lt;code&gt;Content-Length&lt;/code&gt; header to determine the end of the request body, forwarding the full request. The back-end server interprets the request using &lt;code&gt;Transfer-Encoding: chunked&lt;/code&gt;, processing only the first chunk (declared as zero-length) and treating the remaining bytes as a new, separate request. The attacker embeds a second, hidden request in the body of the original message. Due to the parsing mismatch, this smuggled request is processed independently by the back-end server.&lt;/p&gt;</description>
      <content>&lt;h1 id=&#34;summary&#34;&gt;Summary&lt;/h1&gt;
&lt;p&gt;SRA has identified a vulnerability in Quest Coexistence Manager for Notes that can lead to bypassing access controls, poisoning web caches, hijacking sessions, or triggering unintended internal requests.&lt;/p&gt;
&lt;h1 id=&#34;cve-identifiers&#34;&gt;CVE Identifiers&lt;/h1&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;CVE ID&lt;/th&gt;
          &lt;th&gt;CVE Name&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;CVE-2025-12874&lt;/td&gt;
          &lt;td&gt;HTTP Request Smuggling in Quest Coexistence Manager for Notes&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h1 id=&#34;vulnerability-details--description&#34;&gt;Vulnerability Details / Description&lt;/h1&gt;
&lt;p&gt;Quest Coexistence Manager for Notes (3.8.2045) is vulnerable in the Free/Busy Connector to HTTP request smuggling from an unauthenticated remote attacker. The front-end and back-end components rely on inconsistent header parsing, resulting in desynchronized request boundaries. In this case, the front-end server uses the &lt;code&gt;Content-Length&lt;/code&gt; header to determine the end of the request body, forwarding the full request. The back-end server interprets the request using &lt;code&gt;Transfer-Encoding: chunked&lt;/code&gt;, processing only the first chunk (declared as zero-length) and treating the remaining bytes as a new, separate request. The attacker embeds a second, hidden request in the body of the original message. Due to the parsing mismatch, this smuggled request is processed independently by the back-end server.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Severity&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The CVSS base score of this vulnerability has been calculated to be 6.3 (Medium).&lt;/p&gt;
&lt;p&gt;CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/U:Clear&lt;/p&gt;
&lt;h1 id=&#34;affected-versions-and-models&#34;&gt;Affected Versions and Models&lt;/h1&gt;
&lt;p&gt;Quest Coexistence Manager for Notes 3.8.2045&lt;/p&gt;
&lt;h1 id=&#34;mitre-cwe-weakness-enumeration&#34;&gt;MITRE CWE Weakness Enumeration&lt;/h1&gt;
&lt;p&gt;CWE-444: Inconsistent Interpretation of HTTP Requests&lt;/p&gt;
&lt;h1 id=&#34;remediation-options&#34;&gt;Remediation Options&lt;/h1&gt;
&lt;p&gt;Update Quest Coexistence Manager for Notes to latest version.&lt;/p&gt;
&lt;h1 id=&#34;source&#34;&gt;Source&lt;/h1&gt;
&lt;p&gt;This vulnerability was discovered by Cam Lischke as part of research performed by Security Risk Advisors.&lt;/p&gt;
&lt;h1 id=&#34;timeframe&#34;&gt;Timeframe&lt;/h1&gt;
&lt;ul&gt;
&lt;li&gt;November 3, 2025 – SRA submits vulnerability support case to Quest.&lt;/li&gt;
&lt;li&gt;November 4 through November 7, 2025 – SRA submits details of vulnerability to Quest.&lt;/li&gt;
&lt;li&gt;December 9, 2025 – SRA notifies Quest of intent to publicly disclose.&lt;/li&gt;
&lt;li&gt;December 12, 2025 – Quest acknowledges intent to publicly disclose.&lt;/li&gt;
&lt;li&gt;December 17, 2025 – Quest notifies SRA of intent to create a knowledge base article for Quest Support Portal&lt;/li&gt;
&lt;/ul&gt;
</content>
    </item>
    
  </channel>
</rss>
