Bug 2182057 (CVE-2023-28858) - CVE-2023-28858 redis: Async command information disclosure
Summary: CVE-2023-28858 redis: Async command information disclosure
Keywords:
Status: NEW
Alias: CVE-2023-28858
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Nobody
QA Contact:
URL:
Whiteboard:
Depends On: 2183502 2221861
Blocks: 2182047
TreeView+ depends on / blocked
 
Reported: 2023-03-27 12:32 UTC by Avinash Hanwate
Modified: 2023-07-12 10:28 UTC (History)
28 users (show)

Fixed In Version: redis 4.3.6, redis 4.4.3, redis 4.5.3
Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in Redis redis-py. This flaw allows a remote, authenticated attacker to obtain sensitive information caused by an issue with leaving a connection open after canceling an async Redis command at an inopportune time. By sending a specially crafted request, an attacker can obtain sensitive information and use this information to launch further attacks against the affected system.
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description Avinash Hanwate 2023-03-27 12:32:40 UTC
redis-py before 4.5.3, as used in ChatGPT and other products, leaves a connection open after canceling an async Redis command at an inopportune time (in the case of a pipeline operation), and can send response data to the client of an unrelated request in an off-by-one manner. The fixed versions for this CVE Record are 4.3.6, 4.4.3, and 4.5.3; however, CVE-2023-28859 is a separate vulnerability.

https://github.com/redis/redis-py/compare/v4.3.5...v4.3.6
https://github.com/redis/redis-py/pull/2641
https://openai.com/blog/march-20-chatgpt-outage
https://github.com/redis/redis-py/issues/2624
https://github.com/redis/redis-py/compare/v4.4.2...v4.4.3
https://github.com/redis/redis-py/compare/v4.5.2...v4.5.3

Comment 4 Avinash Hanwate 2023-07-11 06:08:47 UTC
Created pymodbus tracking bugs for this issue:

Affects: fedora-all [bug 2221861]


Note You need to log in before you can comment on or make changes to this bug.