Description
Cowrie versions prior to 2.9.0 contain a server-side request forgery (SSRF) vulnerability in the emulated shell implementation of wget and curl. In the default emulated shell configuration, these command emulations perform real outbound HTTP requests to attacker-supplied destinations. Because no outbound request rate limiting was enforced, unauthenticated remote attackers could repeatedly invoke these commands to generate unbounded HTTP traffic toward arbitrary third-party targets, allowing the Cowrie honeypot to be abused as a denial-of-service amplification node and masking the attacker’s true source address behind the honeypot’s IP.
INFO
Published Date :
2025-12-31T21:36:19.022Z
Last Modified :
2026-03-05T12:04:26.318Z
Source :
VulnCheck
AFFECTED PRODUCTS
The following products are affected by CVE-2025-34469 vulnerability.
| Vendors | Products |
|---|---|
| Cowrie |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2025-34469.