Redis is an in-memory database that persists on disk. Authenticated users can use string matching commands (like `SCAN` or `KEYS`) with a specially crafted pattern to trigger a denial-of-service attack on Redis, causing it to hang and consume 100% CPU time. The problem is fixed in Redis versions 6.0.18, 6.2.11, 7.0.9.
References
Link | Resource |
---|---|
https://github.com/redis/redis/security/advisories/GHSA-jr7j-rfj5-8xqv | Vendor Advisory |
https://github.com/redis/redis/commit/dcbfcb916ca1a269b3feef86ee86835294758f84 | Patch |
Configurations
Configuration 1 (hide)
|
Information
Published : 2023-03-01 08:15
Updated : 2023-03-08 17:07
NVD link : CVE-2022-36021
Mitre link : CVE-2022-36021
JSON object : View
CWE
CWE-407
Inefficient Algorithmic Complexity
Products Affected
redis
- redis