Логотип exploitDog
bind:CVE-2025-59088
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-59088

Количество 14

Количество 14

ubuntu логотип

CVE-2025-59088

5 месяцев назад

If kdcproxy receives a request for a realm which does not have server addresses defined in its configuration, by default, it will query SRV records in the DNS zone matching the requested realm name. This creates a server-side request forgery vulnerability, since an attacker could send a request for a realm matching a DNS zone where they created SRV records pointing to arbitrary ports and hostnames (which may resolve to loopback or internal IP addresses). This vulnerability can be exploited to probe internal network topology and firewall rules, perform port scanning, and exfiltrate data. Deployments where the "use_dns" setting is explicitly set to false are not affected.

CVSS3: 8.6
EPSS: Низкий
redhat логотип

CVE-2025-59088

5 месяцев назад

If kdcproxy receives a request for a realm which does not have server addresses defined in its configuration, by default, it will query SRV records in the DNS zone matching the requested realm name. This creates a server-side request forgery vulnerability, since an attacker could send a request for a realm matching a DNS zone where they created SRV records pointing to arbitrary ports and hostnames (which may resolve to loopback or internal IP addresses). This vulnerability can be exploited to probe internal network topology and firewall rules, perform port scanning, and exfiltrate data. Deployments where the "use_dns" setting is explicitly set to false are not affected.

CVSS3: 8.6
EPSS: Низкий
nvd логотип

CVE-2025-59088

5 месяцев назад

If kdcproxy receives a request for a realm which does not have server addresses defined in its configuration, by default, it will query SRV records in the DNS zone matching the requested realm name. This creates a server-side request forgery vulnerability, since an attacker could send a request for a realm matching a DNS zone where they created SRV records pointing to arbitrary ports and hostnames (which may resolve to loopback or internal IP addresses). This vulnerability can be exploited to probe internal network topology and firewall rules, perform port scanning, and exfiltrate data. Deployments where the "use_dns" setting is explicitly set to false are not affected.

CVSS3: 8.6
EPSS: Низкий
debian логотип

CVE-2025-59088

5 месяцев назад

If kdcproxy receives a request for a realm which does not have server ...

CVSS3: 8.6
EPSS: Низкий
github логотип

GHSA-crfg-8xhr-7q4w

5 месяцев назад

If kdcproxy receives a request for a realm which does not have server addresses defined in its configuration, by default, it will query SRV records in the DNS zone matching the requested realm name. This creates a server-side request forgery vulnerability, since an attacker could send a request for a realm matching a DNS zone where they created SRV records pointing to arbitrary ports and hostnames (which may resolve to loopback or internal IP addresses). This vulnerability can be exploited to probe internal network topology and firewall rules, perform port scanning, and exfiltrate data. Deployments where the "use_dns" setting is explicitly set to false are not affected.

CVSS3: 8.6
EPSS: Низкий
fstec логотип

BDU:2026-03011

5 месяцев назад

Уязвимость прокси-сервера для протокола Kerberos Python-kdcproxy, связанная с недостаточной проверкой поступающих запросов, позволяющая нарушителю получить доступ к конфиденциальным данным

CVSS3: 8.6
EPSS: Низкий
redos логотип

ROS-20260129-73-0027

2 месяца назад

Уязвимость python-kdcproxy

CVSS3: 8.6
EPSS: Низкий
rocky логотип

RLSA-2025:21142

5 месяцев назад

Important: python-kdcproxy security update

EPSS: Низкий
rocky логотип

RLSA-2025:21140

4 месяца назад

Important: idm:DL1 security update

EPSS: Низкий
rocky логотип

RLSA-2025:21139

5 месяцев назад

Important: python-kdcproxy security update

EPSS: Низкий
oracle-oval логотип

ELSA-2025-22982

4 месяца назад

ELSA-2025-22982: python-kdcproxy security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-21142

4 месяца назад

ELSA-2025-21142: python-kdcproxy security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-21140

5 месяцев назад

ELSA-2025-21140: idm:DL1 security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-21139

4 месяца назад

ELSA-2025-21139: python-kdcproxy security update (IMPORTANT)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2025-59088

If kdcproxy receives a request for a realm which does not have server addresses defined in its configuration, by default, it will query SRV records in the DNS zone matching the requested realm name. This creates a server-side request forgery vulnerability, since an attacker could send a request for a realm matching a DNS zone where they created SRV records pointing to arbitrary ports and hostnames (which may resolve to loopback or internal IP addresses). This vulnerability can be exploited to probe internal network topology and firewall rules, perform port scanning, and exfiltrate data. Deployments where the "use_dns" setting is explicitly set to false are not affected.

CVSS3: 8.6
0%
Низкий
5 месяцев назад
redhat логотип
CVE-2025-59088

If kdcproxy receives a request for a realm which does not have server addresses defined in its configuration, by default, it will query SRV records in the DNS zone matching the requested realm name. This creates a server-side request forgery vulnerability, since an attacker could send a request for a realm matching a DNS zone where they created SRV records pointing to arbitrary ports and hostnames (which may resolve to loopback or internal IP addresses). This vulnerability can be exploited to probe internal network topology and firewall rules, perform port scanning, and exfiltrate data. Deployments where the "use_dns" setting is explicitly set to false are not affected.

CVSS3: 8.6
0%
Низкий
5 месяцев назад
nvd логотип
CVE-2025-59088

If kdcproxy receives a request for a realm which does not have server addresses defined in its configuration, by default, it will query SRV records in the DNS zone matching the requested realm name. This creates a server-side request forgery vulnerability, since an attacker could send a request for a realm matching a DNS zone where they created SRV records pointing to arbitrary ports and hostnames (which may resolve to loopback or internal IP addresses). This vulnerability can be exploited to probe internal network topology and firewall rules, perform port scanning, and exfiltrate data. Deployments where the "use_dns" setting is explicitly set to false are not affected.

CVSS3: 8.6
0%
Низкий
5 месяцев назад
debian логотип
CVE-2025-59088

If kdcproxy receives a request for a realm which does not have server ...

CVSS3: 8.6
0%
Низкий
5 месяцев назад
github логотип
GHSA-crfg-8xhr-7q4w

If kdcproxy receives a request for a realm which does not have server addresses defined in its configuration, by default, it will query SRV records in the DNS zone matching the requested realm name. This creates a server-side request forgery vulnerability, since an attacker could send a request for a realm matching a DNS zone where they created SRV records pointing to arbitrary ports and hostnames (which may resolve to loopback or internal IP addresses). This vulnerability can be exploited to probe internal network topology and firewall rules, perform port scanning, and exfiltrate data. Deployments where the "use_dns" setting is explicitly set to false are not affected.

CVSS3: 8.6
0%
Низкий
5 месяцев назад
fstec логотип
BDU:2026-03011

Уязвимость прокси-сервера для протокола Kerberos Python-kdcproxy, связанная с недостаточной проверкой поступающих запросов, позволяющая нарушителю получить доступ к конфиденциальным данным

CVSS3: 8.6
0%
Низкий
5 месяцев назад
redos логотип
ROS-20260129-73-0027

Уязвимость python-kdcproxy

CVSS3: 8.6
0%
Низкий
2 месяца назад
rocky логотип
RLSA-2025:21142

Important: python-kdcproxy security update

5 месяцев назад
rocky логотип
RLSA-2025:21140

Important: idm:DL1 security update

4 месяца назад
rocky логотип
RLSA-2025:21139

Important: python-kdcproxy security update

5 месяцев назад
oracle-oval логотип
ELSA-2025-22982

ELSA-2025-22982: python-kdcproxy security update (IMPORTANT)

4 месяца назад
oracle-oval логотип
ELSA-2025-21142

ELSA-2025-21142: python-kdcproxy security update (IMPORTANT)

4 месяца назад
oracle-oval логотип
ELSA-2025-21140

ELSA-2025-21140: idm:DL1 security update (IMPORTANT)

5 месяцев назад
oracle-oval логотип
ELSA-2025-21139

ELSA-2025-21139: python-kdcproxy security update (IMPORTANT)

4 месяца назад

Уязвимостей на страницу