Rapid7 Vulnerability & Exploit Database

FreeBSD: VID-8AA6340D-E7C6-41E0-B2A3-3C9E9930312A (CVE-2023-28859): py39-redis -- can send response data to the client of an unrelated request

Free InsightVM Trial No Credit Card Necessary
2024 Attack Intel Report Latest research by Rapid7 Labs
Back to Search

FreeBSD: VID-8AA6340D-E7C6-41E0-B2A3-3C9E9930312A (CVE-2023-28859): py39-redis -- can send response data to the client of an unrelated request

Severity
4
CVSS
(AV:L/AC:M/Au:N/C:P/I:P/A:P)
Published
03/26/2023
Created
05/05/2023
Added
04/14/2023
Modified
04/14/2023

Description

redis-py before 4.4.4 and 4.5.x before 4.5.4 leaves a connection open after canceling an async Redis command at an inopportune time, and can send response data to the client of an unrelated request. (This could, for example, happen for a non-pipeline operation.) NOTE: the solutions for CVE-2023-28859 address data leakage across AsyncIO connections in general.

Solution(s)

  • freebsd-upgrade-package-py39-redis

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;