6.5 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
0.001 Low
EPSS
Percentile
45.7%
redis-py before 4.5.3, as used in ChatGPT and other products, leaves a connection open after canceling an async Redis command at an inopportune time (in the case of a pipeline operation), and can send response data to the client of an unrelated request in an off-by-one manner. The fixed versions for this CVE Record are 4.3.6, 4.4.3, and 4.5.3, but are believed to be incomplete. CVE-2023-28859 has been assigned the issues caused by the incomplete fixes.
github.com/pypa/advisory-database/tree/main/vulns/redis/PYSEC-2023-45.yaml
github.com/redis/redis-py
github.com/redis/redis-py/commit/d56baeb683fc1935cfa343fa2eeb0fa9bd955283
github.com/redis/redis-py/compare/v4.3.5...v4.3.6
github.com/redis/redis-py/compare/v4.4.2...v4.4.3
github.com/redis/redis-py/compare/v4.5.2...v4.5.3
github.com/redis/redis-py/issues/2624
github.com/redis/redis-py/pull/2641
github.com/redis/redis-py/releases/tag/v4.4.4
github.com/redis/redis-py/releases/tag/v4.5.4
nvd.nist.gov/vuln/detail/CVE-2023-28858
openai.com/blog/march-20-chatgpt-outage