CVE-2023-28859
CVSS V2 None
CVSS V3 None
Description
redis-py before 4.4.4 and 4.5.x before 4.5.4 leaves a connection open after canceling an async Redis command at an inopportune time, and can send response data to the client of an unrelated request. (This could, for example, happen for a non-pipeline operation.) NOTE: the solutions for CVE-2023-28859 address data leakage across AsyncIO connections in general.
Overview
- CVE ID
- CVE-2023-28859
- Assigner
- cve@mitre.org
- Vulnerability Status
- Analyzed
- Published Version
- 2023-03-26T19:15:06
- Last Modified Date
- 2023-04-05T19:06:45
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:a:redis:redis-py:*:*:*:*:*:*:*:* | 1 | OR | 4.5.3 |
References
Reference URL | Reference Tags |
---|---|
https://github.com/redis/redis-py/issues/2665 | Issue Tracking Patch Vendor Advisory |
https://github.com/redis/redis-py/pull/2641 | Issue Tracking Patch |
https://github.com/redis/redis-py/pull/2666 | Release Notes |
https://github.com/redis/redis-py/releases/tag/v4.4.4 | Release Notes |
https://github.com/redis/redis-py/releases/tag/v4.5.4 | Release Notes |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2023-28859 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28859 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2023-04-17 03:28:26 | Added to TrackCVE | |||
2023-04-17 03:28:28 | Weakness Enumeration | new |