Uncontrolled Recursion Affecting antirez/redis package, versions [2.2.5,6.2.16) [7.0.0,7.2.6) [7.3.0,7.4.1)
Threat Intelligence
EPSS
0.04% (11th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-UNMANAGED-ANTIREZREDIS-8164109
- published 8 Oct 2024
- disclosed 7 Oct 2024
- credit tomistripping
Introduced: 7 Oct 2024
CVE-2024-31228 Open this link in a new tabHow to fix?
Upgrade antirez/redis
to version 6.2.16, 7.2.6, 7.4.1 or higher.
Overview
Affected versions of this package are vulnerable to Uncontrolled Recursion due to unbounded pattern matching in supported commands such as KEYS
, SCAN
, PSUBSCRIBE
, FUNCTION LIST
, COMMAND LIST
, and ACL definitions. An authenticated attacker can trigger a denial-of-service by using specially crafted, long string match patterns.