3.3
CVSSv3

CVE-2023-41053

Published: 06/09/2023 Updated: 16/09/2023
CVSS v3 Base Score: 3.3 | Impact Score: 1.4 | Exploitability Score: 1.8
VMScore: 0

Vulnerability Summary

Redis is an in-memory database that persists on disk. Redis does not correctly identify keys accessed by `SORT_RO` and as a result may grant users executing this command access to keys that are not explicitly authorized by the ACL configuration. The problem exists in Redis 7.0 or newer and has been fixed in Redis 7.0.13 and 7.2.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

redis redis 7.2.0

redis redis

Vendor Advisories

Debian Bug report logs - #1051512 redis: CVE-2023-41053 Package: src:redis; Maintainer for src:redis is Chris Lamb <lamby@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Fri, 8 Sep 2023 21:03:04 UTC Severity: important Tags: security, upstream Found in version redis/5:7012-2 Fixed in vers ...
DescriptionThe MITRE CVE dictionary describes this issue as: Redis is an in-memory database that persists on disk Redis does not correctly identify keys accessed by `SORT_RO` and as a result may grant users executing this command access to keys that are not explicitly authorized by the ACL configuration The problem exists in Redis 70 or newer an ...