CVE Vulnerabilities

CVE-2023-41053

Improper Privilege Management

Published: Sep 06, 2023 | Modified: Nov 21, 2024
CVSS 3.x
3.3
LOW
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
CVSS 2.x
RedHat/V2
RedHat/V3
3.3 LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

Redis is an in-memory database that persists on disk. Redis does not correctly identify keys accessed by SORT_RO and as a result may grant users executing this command access to keys that are not explicitly authorized by the ACL configuration. The problem exists in Redis 7.0 or newer and has been fixed in Redis 7.0.13 and 7.2.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.

Weakness

The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.

Affected Software

NameVendorStart VersionEnd Version
RedisRedis7.0 (including)7.0.13 (excluding)
RedisRedis7.2.0 (including)7.2.0 (including)
RedisRedis7.2.0-rc1 (including)7.2.0-rc1 (including)
RedisRedis7.2.0-rc2 (including)7.2.0-rc2 (including)
RedisRedis7.2.0-rc3 (including)7.2.0-rc3 (including)
Red Hat Enterprise Linux 9RedHatredis:7-9050020241104103753.9*
RedisUbuntulunar*
RedisUbuntumantic*
RedisUbuntuupstream*

Potential Mitigations

References