BIT-keydb-2023-41053

See a problem?
Import Source
https://github.com/bitnami/vulndb/tree/main/data/keydb/BIT-keydb-2023-41053.json
JSON Data
https://api.osv.dev/v1/vulns/BIT-keydb-2023-41053
Aliases
Published
2024-08-22T19:23:23.662Z
Modified
2025-01-14T12:12:02.933690Z
Summary
[none]
Details

Redis is an in-memory database that persists on disk. Redis does not correctly identify keys accessed by SORT_RO and as a result may grant users executing this command access to keys that are not explicitly authorized by the ACL configuration. The problem exists in Redis 7.0 or newer and has been fixed in Redis 7.0.13 and 7.2.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.

Database specific
{
    "cpes": [
        "cpe:2.3:a:redis:redis:*:*:*:*:*:*:*:*",
        "cpe:2.3:a:redis:redis:7.2.0:-:*:*:*:*:*:*",
        "cpe:2.3:a:redis:redis:7.2.0:rc1:*:*:*:*:*:*",
        "cpe:2.3:a:redis:redis:7.2.0:rc2:*:*:*:*:*:*",
        "cpe:2.3:a:redis:redis:7.2.0:rc3:*:*:*:*:*:*"
    ],
    "severity": "Low"
}
References

Affected packages

Bitnami / keydb

Package

Name
keydb
Purl
pkg:bitnami/keydb

Severity

  • 3.3 (Low) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N CVSS Calculator

Affected ranges

Type
SEMVER
Events
Introduced
7.0.0
Fixed
7.0.13
Type
SEMVER
Events
Introduced
7.2.0
Last affected
7.2.0
Introduced
7.2.0-rc1
Last affected
7.2.0-rc1
Introduced
7.2.0-rc2
Last affected
7.2.0-rc2
Introduced
7.2.0-rc3
Last affected
7.2.0-rc3