CVE-2024-51737

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-51737
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-51737.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-51737
Aliases
  • GHSA-p2pg-67m3-4c76
Downstream
Published
2025-01-08T15:27:15.780Z
Modified
2025-12-05T07:18:51.449094Z
Severity
  • 7.0 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
RediSearch Integer Overflow with LIMIT or KNN arguments can lead to RCE
Details

RediSearch is a Redis module that provides querying, secondary indexing, and full-text search for Redis. An authenticated redis user executing FT.SEARCH or FT.AGGREGATE with a specially crafted LIMIT command argument, or FT.SEARCH with a specially crafted KNN command argument, can trigger an integer overflow, leading to heap overflow and potential remote code execution. This vulnerability is fixed in 2.6.24, 2.8.21, and 2.10.10. Avoid setting value of -1 or large values for configuration parameters MAXSEARCHRESULTS and MAXAGGREGATERESULTS, to avoid exploiting large LIMIT arguments.

Database specific
{
    "cna_assigner": "GitHub_M",
    "cwe_ids": [
        "CWE-122",
        "CWE-190"
    ],
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/51xxx/CVE-2024-51737.json"
}
References

Affected packages

Git / github.com/redisearch/redisearch

Affected ranges

Type
GIT
Repo
https://github.com/redisearch/redisearch
Events
Database specific
{
    "versions": [
        {
            "introduced": "2.0.0"
        },
        {
            "fixed": "2.6.24"
        }
    ]
}
Type
GIT
Repo
https://github.com/redisearch/redisearch
Events
Database specific
{
    "versions": [
        {
            "introduced": "2.8.0"
        },
        {
            "fixed": "2.8.21"
        }
    ]
}
Type
GIT
Repo
https://github.com/redisearch/redisearch
Events
Database specific
{
    "versions": [
        {
            "introduced": "2.10.0"
        },
        {
            "fixed": "2.10.10"
        }
    ]
}

Affected versions

v2.*

v2.10.0
v2.10.1
v2.10.2
v2.10.3
v2.10.4
v2.10.5
v2.10.6
v2.8.0
v2.8.1
v2.8.10
v2.8.11
v2.8.12
v2.8.13
v2.8.14
v2.8.15
v2.8.16
v2.8.17
v2.8.2
v2.8.3
v2.8.4
v2.8.5
v2.8.6
v2.8.7
v2.8.8
v2.8.9