A Cross-Protocol Scripting vulnerability is found in Apache Kvrocks.
Since Kvrocks didn't detect if "Host:" or "POST" appears in RESP requests,
a valid HTTP request can also be sent to Kvrocks as a valid RESP request
and trigger some database operations, which can be dangerous when
it is chained with SSRF.
It is similiar to CVE-2016-10517 in Redis.
This issue affects Apache Kvrocks: from the initial version to the latest version 2.11.0.
Users are recommended to upgrade to version 2.11.1, which fixes the issue.
References
Configurations
No configuration.
History
13 Feb 2025, 22:15
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
07 Feb 2025, 13:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-02-07 13:15
Updated : 2025-02-13 22:15
NVD link : CVE-2025-25069
Mitre link : CVE-2025-25069
CVE.ORG link : CVE-2025-25069
JSON object : View
Products Affected
No product.
CWE
CWE-115
Misinterpretation of Input