A Cross-Protocol Scripting vulnerability is found in Apache Kvrocks.
Since Kvrocks didn't detect if "Host:" or "POST" appears in RESP requests,
a valid HTTP request can also be sent to Kvrocks as a valid RESP request
and trigger some database operations, which can be dangerous when
it is chained with SSRF.
It is similiar to CVE-2016-10517 in Redis.
This issue affects Apache Kvrocks: from the initial version to the latest version 2.11.0.
Users are recommended to upgrade to version 2.11.1, which fixes the issue.
References
| Link | Resource |
|---|---|
| https://lists.apache.org/thread/gbxv9gpsskmdzg6z48zm3tvo8cyo9v3t | Mailing List Vendor Advisory |
| https://www.cve.org/CVERecord?id=CVE-2016-10517 | Not Applicable |
Configurations
History
No history.
Information
Published : 2025-02-07 13:15
Updated : 2025-07-16 14:47
NVD link : CVE-2025-25069
Mitre link : CVE-2025-25069
CVE.ORG link : CVE-2025-25069
JSON object : View
Products Affected
apache
- kvrocks
CWE
CWE-115
Misinterpretation of Input
