Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).
Severity
8.4HIGH
EPSS
28.1%
top 3.52%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedJun 17
Latest updateMay 14

Description

Buffer overflow in redis-cli of Redis before 4.0.10 and 5.x before 5.0 RC3 allows an attacker to achieve code execution and escalate to higher privileges via a crafted command line. NOTE: It is unclear whether there are any common situations in which redis-cli is used with, for example, a -h (aka hostname) argument from an untrusted source.

CVSS vector

CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 2.5 | Impact: 5.9

Affected Packages2 packages

NVDredislabs/redis< 4.0.10+1
Debianredis< 5:4.0.10-1+3

Patches

🔴Vulnerability Details

3
GHSA
GHSA-8829-5g6p-wqm9: Buffer overflow in redis-cli of Redis before 42022-05-14
CVEList
CVE-2018-12326: Buffer overflow in redis-cli of Redis before 42018-06-17
OSV
CVE-2018-12326: Buffer overflow in redis-cli of Redis before 42018-06-17

💥Exploits & PoCs

1
Exploit-DB
Redis-cli < 5.0 - Buffer Overflow (PoC)2018-06-18

📋Vendor Advisories

2
Red Hat
redis: Code execution in redis-cli via crafted command line arguments2018-06-13
Debian
CVE-2018-12326: redis - Buffer overflow in redis-cli of Redis before 4.0.10 and 5.x before 5.0 RC3 allow...2018

💬Community

2
Bugzilla
CVE-2018-12326 redis: code execution via a crafted command line [epel-all]2018-06-22
Bugzilla
CVE-2018-12326 redis: Code execution in redis-cli via crafted command line arguments2018-06-22