5.5
CVSSv3

CVE-2022-36021

Published: 01/03/2023 Updated: 07/11/2023
CVSS v3 Base Score: 5.5 | Impact Score: 3.6 | Exploitability Score: 1.8
VMScore: 0

Vulnerability Summary

Redis is an in-memory database that persists on disk. Authenticated users can use string matching commands (like `SCAN` or `KEYS`) with a specially crafted pattern to trigger a denial-of-service attack on Redis, causing it to hang and consume 100% CPU time. The problem is fixed in Redis versions 6.0.18, 6.2.11, 7.0.9.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

redis redis

Vendor Advisories

Redis is an in-memory database that persists on disk Authenticated users issuing specially crafted `SETRANGE` and `SORT(_RO)` commands can trigger an integer overflow, resulting with Redis attempting to allocate impossible amounts of memory and abort with an out-of-memory (OOM) panic The problem is fixed in Redis versions 708, 629 and 6017 ...
Description<!---->A vulnerability was found in Redis This flaw allows an authenticated to use string matching commands (like SCAN or KEYS) with a specially crafted pattern to trigger a denial of service attack on Redis, causing it to hang and consume 100% of CPU timeA vulnerability was found in Redis This flaw allows an authenticated to use stri ...

Github Repositories

The glob-style string matcher from Redis

Glob matcher from Redis/Valkey This is the glob-style string matcher stringmatch from Redis and its FOSS fork Valkey, extracted as a library It maintains the relevant subset of the Git revision history in parallel to both projects The changes since the Redis license change are tracked in the redis and valkey branches, respectively Of particular note, it was vulnerable to a d