CVE-2023-28425Command Injection in Redis

Severity
5.5MEDIUMNVD
EPSS
45.3%
top 2.39%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 20

Description

Redis is an in-memory database that persists on disk. Starting in version 7.0.8 and prior to version 7.0.10, authenticated users can use the MSETNX command to trigger a runtime assertion and termination of the Redis server process. The problem is fixed in Redis version 7.0.10.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages10 packages

NVDredis/redis7.0.87.0.10
debiandebian/redis< redis 5:7.0.10-1 (bookworm)
Debianredis/redis< 5:7.0.10-1+2
CVEListV5redis/redis>= 7.0.8, < 7.0.10

Patches

🔴Vulnerability Details

1
OSV
CVE-2023-28425: Redis is an in-memory database that persists on disk2023-03-20

📋Vendor Advisories

3
Red Hat
redis: Specially crafted MSETNX command can lead to denial-of-service2023-03-20
Microsoft
Specially crafted MSETNX command can lead to denial-of-service2023-03-14
Debian
CVE-2023-28425: redis - Redis is an in-memory database that persists on disk. Starting in version 7.0.8 ...2023
CVE-2023-28425 — Command Injection in Redis | cvebase