Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2023-36824

Опубликовано: 10 июл. 2023
Источник: redhat
CVSS3: 8.8
EPSS Критический

Описание

Redis is an in-memory database that persists on disk. In Redit 7.0 prior to 7.0.12, extracting key names from a command and a list of arguments may, in some cases, trigger a heap overflow and result in reading random heap memory, heap corruption and potentially remote code execution. Several scenarios that may lead to authenticated users executing a specially crafted COMMAND GETKEYS or COMMAND GETKEYSANDFLAGSand authenticated users who were set with ACL rules that match key names, executing a specially crafted command that refers to a variadic list of key names. The vulnerability is patched in Redis 7.0.12.

A heap overflow vulnerability was found in Redis, where extracting key names from a command and a list of arguments may, in some cases, trigger a heap overflow and result in reading random heap memory, heap corruption, and potentially remote code execution. This flaw allows an attacker to trick authenticated users into executing a specially crafted COMMAND GETKEYS or COMMAND GETKEYSANDFLAGS and also trick authenticated users who were set with ACL rules that match key names, to execute a specially crafted command that refers to a variadic list of key names.

Отчет

The CVE only affects Redis 7.0 or newer versions.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat 3scale API Management Platform 23scale-amp-backend-containerAffected
Red Hat 3scale API Management Platform 23scale-amp-system-containerAffected
Red Hat Advanced Cluster Management for Kubernetes 2rhacm2/search-api-rhel8Not affected
Red Hat Ansible Automation Platform 1.2ansible-towerNot affected
Red Hat Enterprise Linux 8redis:6/redisNot affected
Red Hat Enterprise Linux 9redisNot affected
Red Hat Fuse 7redisNot affected
Red Hat OpenStack Platform 16.1openstack-redis-base-containerNot affected
Red Hat OpenStack Platform 16.1openstack-redis-containerNot affected
Red Hat OpenStack Platform 17.0openstack-redis-containerNot affected

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-122
Дефект:
CWE-131
https://bugzilla.redhat.com/show_bug.cgi?id=2221664redis: heap overflow in COMMAND GETKEYS and ACL evaluation

EPSS

Процентиль: 100%
0.91313
Критический

8.8 High

CVSS3

Связанные уязвимости

CVSS3: 7.4
ubuntu
почти 2 года назад

Redis is an in-memory database that persists on disk. In Redit 7.0 prior to 7.0.12, extracting key names from a command and a list of arguments may, in some cases, trigger a heap overflow and result in reading random heap memory, heap corruption and potentially remote code execution. Several scenarios that may lead to authenticated users executing a specially crafted `COMMAND GETKEYS` or `COMMAND GETKEYSANDFLAGS`and authenticated users who were set with ACL rules that match key names, executing a specially crafted command that refers to a variadic list of key names. The vulnerability is patched in Redis 7.0.12.

CVSS3: 7.4
nvd
почти 2 года назад

Redis is an in-memory database that persists on disk. In Redit 7.0 prior to 7.0.12, extracting key names from a command and a list of arguments may, in some cases, trigger a heap overflow and result in reading random heap memory, heap corruption and potentially remote code execution. Several scenarios that may lead to authenticated users executing a specially crafted `COMMAND GETKEYS` or `COMMAND GETKEYSANDFLAGS`and authenticated users who were set with ACL rules that match key names, executing a specially crafted command that refers to a variadic list of key names. The vulnerability is patched in Redis 7.0.12.

CVSS3: 7.4
debian
почти 2 года назад

Redis is an in-memory database that persists on disk. In Redit 7.0 pri ...

CVSS3: 8.8
fstec
почти 2 года назад

Уязвимость системы управления базами данных (СУБД) Redis, cвязанная с переполнением буфера, позволяющая нарушителю выполнить произвольный код

CVSS3: 8.8
redos
почти 2 года назад

Уязвимость Redis

EPSS

Процентиль: 100%
0.91313
Критический

8.8 High

CVSS3

Уязвимость CVE-2023-36824