PT-2023-3517 · Redis +10 · Redis +10
Yossigo
·
Published
2023-04-18
·
Updated
2025-02-13
·
CVE-2023-28856
6.8
Medium
Base vector | Vector | AV:N/AC:L/Au:S/C:N/I:N/A:C |
Name of the Vulnerable Software and Affected Versions:
Redis versions prior to 6.0.19
Redis versions prior to 6.2.12
Redis versions prior to 7.0.11
Description:
The issue is related to insufficient input validation in the Redis database management system. Exploitation of this issue can allow a remote attacker to cause a denial of service. Authenticated users can use the `HINCRBYFLOAT` command to create an invalid hash field that will crash Redis on access.
Recommendations:
For versions prior to 6.0.19, upgrade to version 6.0.19 or later.
For versions prior to 6.2.12, upgrade to version 6.2.12 or later.
For versions prior to 7.0.11, upgrade to version 7.0.11 or later.
As a temporary workaround, consider restricting access to the `HINCRBYFLOAT` command until a patch is applied.
Exploit
Fix
RCE
Assertion Failure
Related Identifiers
Affected Products
References · 155
- 🔥 https://github.com/convisolabs/CVE-2022-24834⭐ 22 🔗 7 · Exploit
- https://github.com/redis/redis/pull/11149⭐ 70148 🔗 24137 · Patch
- https://github.com/redis/redis/commit/bc7fe41e5857a0854d524e2a63a028e9394d2a5c⭐ 70148 🔗 24137 · Patch
- https://github.com/redis/redis/security/advisories/GHSA-hjv8-vjf6-wcr6⭐ 70148 🔗 24137 · Vendor Advisory
- https://osv.dev/vulnerability/CVE-2023-28856 · Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2023-45145 · Security Note
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LPUTH7NBQTZDVJWFNUD24ZCS6NDUFYS6 · Vendor Advisory
- https://osv.dev/vulnerability/UBUNTU-CVE-2023-28856 · Vendor Advisory
- https://errata.almalinux.org/8/ALSA-2025-0595.html · Vendor Advisory
- https://bdu.fstec.ru/vul/2023-01740 · Security Note
- https://nvd.nist.gov/vuln/detail/CVE-2024-31228 · Security Note
- https://nvd.nist.gov/vuln/detail/CVE-2022-24834 · Security Note
- https://security-tracker.debian.org/tracker/source-package/redis · Vendor Advisory
- https://ubuntu.com/security/notices/USN-6531-1 · Vendor Advisory
- https://security-tracker.debian.org/tracker/DLA-3885-1 · Vendor Advisory