Redis is an in-memory database that persists on disk. Authenticated users can use string matching commands (like `SCAN` or `KEYS`) with a specially crafted pattern to trigger a denial-of-service attack on Redis, causing it to hang and consume 100% CPU time. The problem is fixed in Redis versions 6.0.18, 6.2.11, 7.0.9.
References
Link | Resource |
---|---|
https://github.com/redis/redis/commit/dcbfcb916ca1a269b3feef86ee86835294758f84 | Patch |
https://github.com/redis/redis/security/advisories/GHSA-jr7j-rfj5-8xqv | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
09 Mar 2023, 01:07
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
CPE | cpe:2.3:a:redis:redis:*:*:*:*:*:*:*:* | |
References | (MISC) https://github.com/redis/redis/security/advisories/GHSA-jr7j-rfj5-8xqv - Vendor Advisory | |
References | (MISC) https://github.com/redis/redis/commit/dcbfcb916ca1a269b3feef86ee86835294758f84 - Patch | |
CWE | CWE-407 |
01 Mar 2023, 16:36
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-03-01 16:15
Updated : 2024-02-04 23:14
NVD link : CVE-2022-36021
Mitre link : CVE-2022-36021
CVE.ORG link : CVE-2022-36021
JSON object : View
Products Affected
redis
- redis
CWE
CWE-407
Inefficient Algorithmic Complexity