CVE-2025-25069
Feb. 13, 2025, 10:15 p.m.
6.5
Medium
Description
A Cross-Protocol Scripting vulnerability is found in Apache Kvrocks.
Since Kvrocks didn't detect if "Host:" or "POST" appears in RESP requests,
a valid HTTP request can also be sent to Kvrocks as a valid RESP request
and trigger some database operations, which can be dangerous when
it is chained with SSRF.
It is similiar to CVE-2016-10517 in Redis.
This issue affects Apache Kvrocks: from the initial version to the latest version 2.11.0.
Users are recommended to upgrade to version 2.11.1, which fixes the issue.
Product(s) Impacted
| Product | Versions |
|---|---|
| Apache Kvrocks |
|
Weaknesses
Common security weaknesses mapped to this vulnerability.
CWE-115
Misinterpretation of Input
The product misinterprets an input, whether from an attacker or another product, in a security-relevant fashion.
Tags
CVSS Score
CVSS Data - 3.1
- Attack Vector: NETWORK
- Attack Complexity: LOW
- Privileges Required: NONE
- Scope: UNCHANGED
- Confidentiality Impact: LOW
- Integrity Impact: LOW
- Availability Impact: NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
Timeline
Published: Feb. 7, 2025, 1:15 p.m.
Last Modified: Feb. 13, 2025, 10:15 p.m.
Last Modified: Feb. 13, 2025, 10:15 p.m.
Status : Awaiting Analysis
CVE has been recently published to the CVE List and has been received by the NVD.
More infoSource
security@apache.org
*Disclaimer: Some vulnerabilities do not have an associated CPE. To enhance the data, we use AI to infer CPEs based on CVE details. This is an automated process and might not always be accurate.