6.5 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
0.001 Low
EPSS
Percentile
45.7%
redis-py through 4.5.3 and 4.4.3 leaves a connection open after canceling an async Redis command at an inopportune time (in the case of a non-pipeline operation), and can send response data to the client of an unrelated request. NOTE: this issue exists because of an incomplete fix for CVE-2023-28858.
github.com/advisories/GHSA-8fww-64cx-x8p5
github.com/pypa/advisory-database/tree/main/vulns/redis/PYSEC-2023-46.yaml
github.com/redis/redis-py/commit/66a4d6b2a493dd3a20cc299ab5fef3c14baad965
github.com/redis/redis-py/commit/b3c89acd0ffe8303649ad8207bc911b1d6a033eb
github.com/redis/redis-py/issues/2665
github.com/redis/redis-py/pull/1899
github.com/redis/redis-py/pull/2641
github.com/redis/redis-py/pull/2666
github.com/redis/redis-py/pull/2671
github.com/redis/redis-py/releases/tag/v4.4.4
github.com/redis/redis-py/releases/tag/v4.5.4
nvd.nist.gov/vuln/detail/CVE-2023-28859