QID 730745

Date Published: 2023-03-10

QID 730745: Redis Server Multiple Vulnerabilities (GHSA-vw22-qm3h-49pr)

Redis is an open source, in-memory database that persists on disk.

When using the Redis Lua Debugger, users can send malformed requests that cause the debugger's protocol parser to read data beyond the actual buffer.

Affected Versions:
Redis Server versions prior to 5.0.14
Redis Server versions 6.0.x prior to 6.0.16
Redis Server versions 6.2.x prior to 6.2.6

QID Detection Logic (Remote):
This QID tries to authenticate with the default credential of redis server then sends a "info" to get the version.

An integer overflow bug affecting all versions of Redis can be exploited to corrupt the heap and potentially be used to leak arbitrary contents of the heap or trigger remote code execution

  • CVSS V3 rated as High - 7.5 severity.
  • CVSS V2 rated as High - 6 severity.
  • Solution
    Customers are advised to update to the latest patch version of Redis Server. For more information, Please refer to Redis Security Advisory

    CVEs related to QID 730745

    Software Advisories
    Advisory ID Software Component Link
    GHSA-f6pw-v9gw-v64p URL Logo github.com/redis/redis/security/advisories/GHSA-f6pw-v9gw-v64p
    GHSA-m3mf-8x9w-r27q URL Logo github.com/redis/redis/security/advisories/GHSA-m3mf-8x9w-r27q
    GHSA-vw22-qm3h-49pr URL Logo github.com/redis/redis/security/advisories/GHSA-vw22-qm3h-49pr