HTTP Request Smuggling Affecting apache/kvrocks package, versions [,2.11.1-rc1)


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Not Defined
EPSS
0.04% (12th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-APACHEKVROCKS-8717111
  • published12 Feb 2025
  • disclosed7 Feb 2025
  • creditSergey Volosatov

Introduced: 7 Feb 2025

NewCVE-2025-25069  (opens in a new tab)
CWE-444  (opens in a new tab)

How to fix?

Upgrade apache/kvrocks to version 2.11.1-rc1 or higher.

Overview

Affected versions of this package are vulnerable to HTTP Request Smuggling when interpreting a RESP request in Connection::ExecuteCommands(), which accepts Host: and POST request types. An attacker can perform unauthorized database operations by sending specially crafted HTTP requests that are misinterpreted as valid RESP commands, if another compromise has already been performed that allows them to send messages to the affected service.

CVSS Scores

version 4.0
version 3.1