Redis is an in-memory database that persists on disk. Authenticated users can use string matching commands (like `SCAN` or `KEYS`) with a specially crafted pattern to trigger a denial-of-service attack on Redis, causing it to hang and consume 100% CPU time. The problem is fixed in Redis versions 6.0.18, 6.2.11, 7.0.9.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 07:12
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/redis/redis/commit/dcbfcb916ca1a269b3feef86ee86835294758f84 - Patch | |
References | () https://github.com/redis/redis/security/advisories/GHSA-jr7j-rfj5-8xqv - Vendor Advisory |
09 Mar 2023, 01:07
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:redis:redis:*:*:*:*:*:*:*:* | |
References | (MISC) https://github.com/redis/redis/security/advisories/GHSA-jr7j-rfj5-8xqv - Vendor Advisory | |
References | (MISC) https://github.com/redis/redis/commit/dcbfcb916ca1a269b3feef86ee86835294758f84 - Patch | |
CWE | CWE-407 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
01 Mar 2023, 16:36
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-03-01 16:15
Updated : 2024-11-21 07:12
NVD link : CVE-2022-36021
Mitre link : CVE-2022-36021
CVE.ORG link : CVE-2022-36021
JSON object : View
Products Affected
redis
- redis
CWE
CWE-407
Inefficient Algorithmic Complexity