A Cross-Protocol Scripting vulnerability is found in Apache Kvrocks.
Since Kvrocks didn't detect if "Host:" or "POST" appears in RESP requests,
a valid HTTP request can also be sent to Kvrocks as a valid RESP request
and trigger some database operations, which can be dangerous when
it is chained with SSRF.
It is similiar to CVE-2016-10517 in Redis.
This issue affects Apache Kvrocks: from the initial version to the latest version 2.11.0.
Users are recommended to upgrade to version 2.11.1, which fixes the issue.
Metrics
Affected Vendors & Products
References
History
Thu, 13 Feb 2025 22:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
cvssV3_1
|
Fri, 07 Feb 2025 13:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A Cross-Protocol Scripting vulnerability is found in Apache Kvrocks. Since Kvrocks didn't detect if "Host:" or "POST" appears in RESP requests, a valid HTTP request can also be sent to Kvrocks as a valid RESP request and trigger some database operations, which can be dangerous when it is chained with SSRF. It is similiar to CVE-2016-10517 in Redis. This issue affects Apache Kvrocks: from the initial version to the latest version 2.11.0. Users are recommended to upgrade to version 2.11.1, which fixes the issue. | |
Title | Apache Kvrocks: Cross-Protocol Scripting Vulnerability | |
Weaknesses | CWE-115 | |
References |
|

Status: PUBLISHED
Assigner: apache
Published:
Updated: 2025-02-13T21:21:42.342Z
Reserved: 2025-02-03T13:33:31.674Z
Link: CVE-2025-25069

Updated: 2025-02-13T21:21:06.456Z

Status : Awaiting Analysis
Published: 2025-02-07T13:15:32.170
Modified: 2025-02-13T22:15:12.930
Link: CVE-2025-25069

No data.