Heap-based Buffer Overflow Affecting RediSearch/RediSearch package, versions [,2.6.24)[2.8.0,2.8.21)[2.10.0,2.10.10)


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.04% (12th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-REDISEARCHREDISEARCH-8606712
  • published9 Jan 2025
  • disclosed8 Jan 2025
  • creditkei-nan

Introduced: 8 Jan 2025

NewCVE-2024-51737  (opens in a new tab)
CWE-122  (opens in a new tab)

How to fix?

Upgrade RediSearch/RediSearch to version 2.6.24, 2.8.21, 2.10.10 or higher.

Overview

Affected versions of this package are vulnerable to Heap-based Buffer Overflow via the FT.SEARCH or FT.AGGREGATE commands with improperly handled LIMIT or KNN arguments. An attacker can execute arbitrary code by sending specially crafted command arguments.

Note:

This is only exploitable if the configuration parameters MAXSEARCHRESULTS and MAXAGGREGATERESULTS are set to -1 or excessively large values.

Workaround

This vulnerability can be mitigated by avoiding the setting of -1 or large values for configuration parameters MAXSEARCHRESULTS and MAXAGGREGATERESULTS, to prevent exploiting large LIMIT arguments.

References

CVSS Scores

version 4.0
version 3.1