First published: Wed Sep 06 2023(Updated: )
Redis is an in-memory database that persists on disk. Redis does not correctly identify keys accessed by `SORT_RO` and as a result may grant users executing this command access to keys that are not explicitly authorized by the ACL configuration. The problem exists in Redis 7.0 or newer and has been fixed in Redis 7.0.13 and 7.2.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/redis-server | <7.0.13 | 7.0.13 |
redhat/redis-server | <7.2.1 | 7.2.1 |
ioredis | >=7.0<7.0.13 | |
ioredis | =7.2.0 | |
ioredis | =7.2.0-rc1 | |
ioredis | =7.2.0-rc2 | |
ioredis | =7.2.0-rc3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-41053 is a vulnerability in Redis that allows users executing the `SORT_RO` command to access keys that are not explicitly authorized by the ACL configuration.
The severity of CVE-2023-41053 is low with a severity value of 3.3.
Redis versions 7.0 to 7.0.13, 7.2.0, 7.2.0-rc1, 7.2.0-rc2, and 7.2.0-rc3 are affected by CVE-2023-41053.
To fix CVE-2023-41053, upgrade Redis to version 7.0.14 or higher.
You can find more information about CVE-2023-41053 in the references section of this advisory.