{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-25069","assignerOrgId":"f0158376-9dc2-43b6-827c-5f631a4d8d09","state":"PUBLISHED","assignerShortName":"apache","dateReserved":"2025-02-03T13:33:31.674Z","datePublished":"2025-02-07T12:46:11.350Z","dateUpdated":"2025-02-13T21:21:42.342Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"Apache Kvrocks","vendor":"Apache Software Foundation","versions":[{"lessThanOrEqual":"2.11.0","status":"affected","version":"0","versionType":"semver"}]}],"credits":[{"lang":"en","type":"reporter","value":"Sergey Volosatov"}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>A Cross-Protocol Scripting vulnerability is found in Apache Kvrocks.</p>Since Kvrocks didn't detect if \"Host:\" or \"POST\" appears in RESP requests,<br>a valid HTTP request can also be sent to Kvrocks as a valid RESP request <br>and trigger some database operations, which can be<span style=\"background-color: rgb(255, 255, 255);\">&nbsp;dangerous when <br>it is chained with SSRF.<br><br></span>It is similiar to&nbsp;CVE-2016-10517 in Redis.<br><br><p>This issue affects Apache Kvrocks: from the initial version to the latest version 2.11.0.</p><p>Users are recommended to upgrade to version 2.11.1, which fixes the issue.</p>"}],"value":"A Cross-Protocol Scripting vulnerability is found in Apache Kvrocks.\n\nSince Kvrocks didn't detect if \"Host:\" or \"POST\" appears in RESP requests,\na valid HTTP request can also be sent to Kvrocks as a valid RESP request \nand trigger some database operations, which can be dangerous when \nit is chained with SSRF.\n\nIt is similiar to CVE-2016-10517 in Redis.\n\nThis issue affects Apache Kvrocks: from the initial version to the latest version 2.11.0.\n\nUsers are recommended to upgrade to version 2.11.1, which fixes the issue."}],"metrics":[{"other":{"content":{"text":"Moderate"},"type":"Textual description of severity"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-115","description":"CWE-115 Misinterpretation of Input","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"f0158376-9dc2-43b6-827c-5f631a4d8d09","shortName":"apache","dateUpdated":"2025-02-07T12:46:11.350Z"},"references":[{"tags":["related"],"url":"https://www.cve.org/CVERecord?id=CVE-2016-10517"},{"tags":["vendor-advisory"],"url":"https://lists.apache.org/thread/gbxv9gpsskmdzg6z48zm3tvo8cyo9v3t"}],"source":{"discovery":"EXTERNAL"},"title":"Apache Kvrocks: Cross-Protocol Scripting Vulnerability","x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":6.5,"attackVector":"NETWORK","baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N","integrityImpact":"LOW","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"NONE","privilegesRequired":"NONE","confidentialityImpact":"LOW"}},{"other":{"type":"ssvc","content":{"timestamp":"2025-02-13T21:21:35.668189Z","id":"CVE-2025-25069","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-02-13T21:21:42.342Z"}}]}}