QID 730746

Date Published: 2023-03-10

QID 730746: Redis Server Heap-based Buffer Overflow Vulnerability (GHSA-p486-xggp-782c)

Redis is an open source, in-memory database that persists on disk.

Affected Versions:
Redis Server versions 2.6 prior to 5.0.14
Redis Server versions 6.0.x prior to 6.0.16
Redis Server versions 6.2.x prior to 6.2.6

QID Detection Logic (Remote):
This QID tries to authenticate with the default credential of redis server then sends a "info" to get the version.

Specially crafted Lua scripts executing in Redis can cause the heap-based Lua stack to be overflowed, due to incomplete checks for this condition. This can result with heap corruption and potentially remote code execution.

  • CVSS V3 rated as Critical - 8.8 severity.
  • CVSS V2 rated as High - 6.5 severity.
  • Solution
    Customers are advised to update to the latest patch version of Redis Server. For more information, Please refer to Redis Security Advisory

    CVEs related to QID 730746

    Software Advisories
    Advisory ID Software Component Link
    GHSA-p486-xggp-782c URL Logo github.com/redis/redis/security/advisories/GHSA-p486-xggp-782c