Lucene search

K
githubGitHub Advisory DatabaseGHSA-24WV-MV5M-XV4H
HistoryMar 26, 2023 - 9:30 p.m.

redis-py Race Condition vulnerability

2023-03-2621:30:23
CWE-193
GitHub Advisory Database
github.com
53
redis-py
race condition
vulnerability
open connection
async command
incomplete fix
off-by-one
cve-2023-28859

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

0.001 Low

EPSS

Percentile

45.7%

redis-py before 4.5.3, as used in ChatGPT and other products, leaves a connection open after canceling an async Redis command at an inopportune time (in the case of a pipeline operation), and can send response data to the client of an unrelated request in an off-by-one manner. The fixed versions for this CVE Record are 4.3.6, 4.4.3, and 4.5.3, but are believed to be incomplete. CVE-2023-28859 has been assigned the issues caused by the incomplete fixes.

Affected configurations

Vulners
Node
redisredisRange<4.3.6
OR
redisredisRange<4.5.3
OR
redisredisRange<4.4.3
CPENameOperatorVersion
redislt4.3.6
redislt4.5.3
redislt4.4.3

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

0.001 Low

EPSS

Percentile

45.7%