Buffer Overflow Affecting redis/redis package, versions [,6.0.20)[6.2.0,6.2.13)[7.0.0,7.0.12)


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.23% (61st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-REDISREDIS-5772323
  • published12 Jul 2023
  • disclosed10 Jul 2023
  • creditYudai Fujiwara, Seiya Nakata

Introduced: 10 Jul 2023

CVE-2022-24834  (opens in a new tab)
CWE-680  (opens in a new tab)

How to fix?

Upgrade redis/redis to version 6.0.20, 6.2.13, 7.0.12 or higher.

Overview

Affected versions of this package are vulnerable to Buffer Overflow via the cjson and cmsgpack libraries when a specially crafted Lua script executing in Redis.

Workaround

An additional workaround to mitigate the problem without patching the redis-server executable is to prevent users from executing Lua scripts. This can be done using ACL to restrict EVAL and EVALSHA commands.

CVSS Scores

version 3.1