First published: Sun Mar 26 2023(Updated: )
redis-py before 4.5.3 leaves a connection open after canceling an async Redis command at an inopportune time, and can send response data to the client of an unrelated request in an off-by-one manner. NOTE: this CVE Record was initially created in response to reports about ChatGPT, and 4.3.6, 4.4.3, and 4.5.3 were released (changing the behavior for pipeline operations); however, please see CVE-2023-28859 about addressing data leakage across AsyncIO connections in general.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Redis Redis-py | >=4.2.0<4.3.6 | |
Redis Redis-py | >=4.4.0<4.4.3 | |
Redis Redis-py | >=4.5.0<4.5.3 | |
pip/redis | >=4.2.0<4.3.6 | 4.3.6 |
pip/redis | >=4.5.0<4.5.3 | 4.5.3 |
pip/redis | >=4.4.0<4.4.3 | 4.4.3 |
>=4.2.0<4.3.6 | ||
>=4.4.0<4.4.3 | ||
>=4.5.0<4.5.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this security issue is CVE-2023-28858.
The severity level of CVE-2023-28858 is low.
The affected software of CVE-2023-28858 is Redis Redis-py versions between 4.2.0 and 4.3.6, 4.4.0 and 4.4.3, and 4.5.0 and 4.5.3.
An attacker can exploit this vulnerability by canceling an async Redis command at an inopportune time and causing a connection to remain open, potentially allowing them to send response data to the client of an unrelated request.
Yes, a fix is available for CVE-2023-28858 in version 4.5.3 of Redis-py.