CVE | CVE-2022-36021 |
CVE Ordinal Value | 241782 |
Published Date | 2023-03-01T16:15Z |
Modified Date | 2023-03-09T01:07Z |
CWE Type | CWE-407 |
CVSS 3.x | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
Description | Redis is an in-memory database that persists on disk. Authenticated users can use string matching commands (like `SCAN` or `KEYS`) with a specially crafted pattern to trigger a denial-of-service attack on Redis, causing it to hang and consume 100% CPU time. The problem is fixed in Redis versions 6.0.18, 6.2.11, 7.0.9. |
References | |
By clicking these links you will leave this website. We do not endorse and will not be held accountable for any activity on external sites. | |
Reference URL | https://github.com/redis/redis/security/advisories/GHSA-jr7j-rfj5-8xqv |
Reference Description | MISC https://github.com/redis/redis/security/advisories/GHSA-jr7j-rfj5-8xqv |
Reference URL | https://github.com/redis/redis/commit/dcbfcb916ca1a269b3feef86ee86835294758f84 |
Reference Description | MISC https://github.com/redis/redis/commit/dcbfcb916ca1a269b3feef86ee86835294758f84 |
Tags | Vendor Advisory |
Sources | NIST MITRE |