QID 730745
Date Published: 2023-03-10
QID 730745: Redis Server Multiple Vulnerabilities (GHSA-vw22-qm3h-49pr)
Redis is an open source, in-memory database that persists on disk.
When using the Redis Lua Debugger, users can send malformed requests that cause the debugger's protocol parser to read data beyond the actual buffer.
Affected Versions:
Redis Server versions prior to 5.0.14
Redis Server versions 6.0.x prior to 6.0.16
Redis Server versions 6.2.x prior to 6.2.6
QID Detection Logic (Remote):
This QID tries to authenticate with the default credential of redis server then sends a "info" to get the version.
An integer overflow bug affecting all versions of Redis can be exploited to corrupt the heap and potentially be used to leak arbitrary contents of the heap or trigger remote code execution
Solution
Customers are advised to update to the latest patch version of Redis Server. For more information, Please refer to Redis Security Advisory
Vendor References
- GHSA-f6pw-v9gw-v64p -
github.com/redis/redis/security/advisories/GHSA-f6pw-v9gw-v64p - GHSA-m3mf-8x9w-r27q -
github.com/redis/redis/security/advisories/GHSA-m3mf-8x9w-r27q - GHSA-vw22-qm3h-49pr -
github.com/redis/redis/security/advisories/GHSA-vw22-qm3h-49pr
CVEs related to QID 730745
Software Advisories
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| GHSA-f6pw-v9gw-v64p |
|
||
| GHSA-m3mf-8x9w-r27q |
|
||
| GHSA-vw22-qm3h-49pr |
|