First published: Sun Mar 26 2023(Updated: )
redis-py before 4.4.4 and 4.5.x before 4.5.4 leaves a connection open after canceling an async Redis command at an inopportune time, and can send response data to the client of an unrelated request. (This could, for example, happen for a non-pipeline operation.) NOTE: the solutions for CVE-2023-28859 address data leakage across AsyncIO connections in general.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
pip/redis | >=4.2.0<4.4.4 | 4.4.4 |
pip/redis | >=4.5.0<4.5.4 | 4.5.4 |
Redis Redis-py | >=4.2.0<4.4.4 | |
Redis Redis-py | >=4.5.0<4.5.4 | |
>=4.2.0<4.4.4 | ||
>=4.5.0<4.5.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-28859.
The severity of CVE-2023-28859 is medium.
The software versions affected by CVE-2023-28859 are redis-py before 4.4.4 and 4.5.x before 4.5.4.
CVE-2023-28859 can be fixed by upgrading to redis-py version 4.4.4 or 4.5.4.
You can find more information about CVE-2023-28859 at the following references: [link1], [link2], [link3].