5.5
CVSSv3

CVE-2023-28425

Published: 20/03/2023 Updated: 13/04/2023
CVSS v3 Base Score: 5.5 | Impact Score: 3.6 | Exploitability Score: 1.8
VMScore: 0

Vulnerability Summary

Redis is an in-memory database that persists on disk. Starting in version 7.0.8 and prior to version 7.0.10, authenticated users can use the MSETNX command to trigger a runtime assertion and termination of the Redis server process. The problem is fixed in Redis version 7.0.10.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

redis redis

Vendor Advisories

Debian Bug report logs - #1033340 redis: CVE-2023-28425 Package: src:redis; Maintainer for src:redis is Chris Lamb <lamby@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Wed, 22 Mar 2023 21:42:02 UTC Severity: grave Tags: security, upstream Found in version redis/5:709-1 Reply or subs ...
DescriptionThe MITRE CVE dictionary describes this issue as: Redis is an in-memory database that persists on disk Starting in version 708 and prior to version 7010, authenticated users can use the MSETNX command to trigger a runtime assertion and termination of the Redis server process The problem is fixed in Redis version 7010 ...

Github Repositories

A curated list of awesome security tools, experimental case or other interesting things with LLM or GPT.

Awesome GPT + Security A curated list of awesome security tools, experimental case or other interesting things with LLM or GPT Contents Tools Integrated Audit Reconnaissance Offensive Detecting Preventing Social Engineering Reverse Engineering Investigation Fix Assessment Cases Experimental Academic Blogs Fun GPT Security Standard Bypass Security Policy Bug Bounty Cra