CVE-2023-28425

Redis is an in-memory database that persists on disk. Starting in version 7.0.8 and prior to version 7.0.10, authenticated users can use the MSETNX command to trigger a runtime assertion and termination of the Redis server process. The problem is fixed in Redis version 7.0.10.
Configurations

Configuration 1 (hide)

cpe:2.3:a:redis:redis:*:*:*:*:*:*:*:*

History

24 Mar 2023, 18:13

Type Values Removed Values Added
CWE CWE-77 CWE-617
CPE cpe:2.3:a:redis:redis:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
References (MISC) https://github.com/redis/redis/security/advisories/GHSA-mvmm-4vq6-vw8c - (MISC) https://github.com/redis/redis/security/advisories/GHSA-mvmm-4vq6-vw8c - Vendor Advisory
References (MISC) https://github.com/redis/redis/commit/48e0d4788434833b47892fe9f3d91be7687f25c9 - (MISC) https://github.com/redis/redis/commit/48e0d4788434833b47892fe9f3d91be7687f25c9 - Patch
References (MISC) https://github.com/redis/redis/releases/tag/7.0.10 - (MISC) https://github.com/redis/redis/releases/tag/7.0.10 - Release Notes

20 Mar 2023, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-03-20 20:15

Updated : 2024-02-04 23:37


NVD link : CVE-2023-28425

Mitre link : CVE-2023-28425

CVE.ORG link : CVE-2023-28425


JSON object : View

Products Affected

redis

  • redis
CWE
CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')

CWE-617

Reachable Assertion