Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-59088— Python-kdcproxy: unauthenticated ssrf via realm‑controlled dns srv

CVSS 8.6 · High EPSS 0.08% · P23
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2025-59088

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Python-kdcproxy: unauthenticated ssrf via realm‑controlled dns srv
Source: NVD (National Vulnerability Database)
Vulnerability Description
If kdcproxy receives a request for a realm which does not have server addresses defined in its configuration, by default, it will query SRV records in the DNS zone matching the requested realm name. This creates a server-side request forgery vulnerability, since an attacker could send a request for a realm matching a DNS zone where they created SRV records pointing to arbitrary ports and hostnames (which may resolve to loopback or internal IP addresses). This vulnerability can be exploited to probe internal network topology and firewall rules, perform port scanning, and exfiltrate data. Deployments where the "use_dns" setting is explicitly set to false are not affected.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
服务端请求伪造(SSRF)
Source: NVD (National Vulnerability Database)
Vulnerability Title
kdcproxy 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
kdcproxy是latchset开源的一个Python库 kdcproxy存在安全漏洞,该漏洞源于默认查询DNS SRV记录,可能导致服务器端请求伪造攻击。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
latchsetkdcproxy 0 ~ 1.1.0 -
Red HatRed Hat Enterprise Linux 10 0:1.0.0-19.el10_1 ~ * cpe:/o:redhat:enterprise_linux:10.1
Red HatRed Hat Enterprise Linux 10.0 Extended Update Support 0:1.0.0-19.el10_0 ~ * cpe:/o:redhat:enterprise_linux_eus:10.0
Red HatRed Hat Enterprise Linux 7 Extended Lifecycle Support 0:0.3.2-3.el7_9.3 ~ * cpe:/o:redhat:rhel_els:7
Red HatRed Hat Enterprise Linux 8 8100020251103113748.143e9e98 ~ * cpe:/a:redhat:enterprise_linux:8::appstream
Red HatRed Hat Enterprise Linux 8 8100020251028161822.823393f5 ~ * cpe:/a:redhat:enterprise_linux:8::appstream
Red HatRed Hat Enterprise Linux 8.2 Advanced Update Support 8020020251106022345.792f4060 ~ * cpe:/a:redhat:rhel_aus:8.2::appstream
Red HatRed Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support 8040020251103205102.5b01ab7e ~ * cpe:/a:redhat:rhel_aus:8.4::appstream
Red HatRed Hat Enterprise Linux 8.4 Extended Update Support Long-Life Add-On 8040020251103205102.5b01ab7e ~ * cpe:/a:redhat:rhel_aus:8.4::appstream
Red HatRed Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support 8060020251030180424.ada582f1 ~ * cpe:/a:redhat:rhel_e4s:8.6::appstream
Red HatRed Hat Enterprise Linux 8.6 Telecommunications Update Service 8060020251030180424.ada582f1 ~ * cpe:/a:redhat:rhel_e4s:8.6::appstream
Red HatRed Hat Enterprise Linux 8.6 Update Services for SAP Solutions 8060020251030180424.ada582f1 ~ * cpe:/a:redhat:rhel_e4s:8.6::appstream
Red HatRed Hat Enterprise Linux 8.8 Telecommunications Update Service 8080020251029082621.b0a6ceea ~ * cpe:/a:redhat:rhel_e4s:8.8::appstream
Red HatRed Hat Enterprise Linux 8.8 Update Services for SAP Solutions 8080020251029082621.b0a6ceea ~ * cpe:/a:redhat:rhel_e4s:8.8::appstream
Red HatRed Hat Enterprise Linux 9 0:1.0.0-9.el9_7 ~ * cpe:/a:redhat:enterprise_linux:9::appstream
Red HatRed Hat Enterprise Linux 9.0 Update Services for SAP Solutions 0:1.0.0-7.el9_0.1 ~ * cpe:/a:redhat:rhel_e4s:9.0::appstream
Red HatRed Hat Enterprise Linux 9.2 Update Services for SAP Solutions 0:1.0.0-7.el9_2.1 ~ * cpe:/a:redhat:rhel_e4s:9.2::appstream
Red HatRed Hat Enterprise Linux 9.4 Extended Update Support 0:1.0.0-7.el9_4.1 ~ * cpe:/a:redhat:rhel_eus:9.4::appstream
Red HatRed Hat Enterprise Linux 9.6 Extended Update Support 0:1.0.0-9.el9_6 ~ * cpe:/a:redhat:rhel_eus:9.6::appstream

II. Public POCs for CVE-2025-59088

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2025-59088

登录查看更多情报信息。

IV. Related Vulnerabilities

V. Comments for CVE-2025-59088

No comments yet


Leave a comment