Vulnerabilities > CVE-2016-10517 - 7PK - Security Features vulnerability in Redislabs Redis
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
HIGH Integrity impact
NONE Availability impact
NONE Summary
networking.c in Redis before 3.2.7 allows "Cross Protocol Scripting" because it lacks a check for POST and Host: strings, which are not valid in the Redis protocol (but commonly occur when an attack triggers an HTTP request to the Redis TCP port).
Vulnerable Configurations
Common Weakness Enumeration (CWE)
Nessus
NASL family | SuSE Local Security Checks |
NASL id | OPENSUSE-2017-1258.NASL |
description | This update for redis to version 4.0.2 fixes the following issues : - CVE-2016-8339: CONFIG SET client-output-buffer-limit Code Execution Vulnerability (boo#1002351) The following upstream changes are included : - SLOWLOG now logs the offending client name and address - The modules native data types RDB format changed. - The AOF check utility is now able to deal with RDB preambles. - GEORADIUS_RO and GEORADIUSBYMEMBER_RO variants, not supporting the STORE option, were added in order to allow read-only scaling of such queries. - HSET is now variadic, and HMSET is considered deprecated - GEORADIUS huge radius (>= ~6000 km) corner cases fixed - HyperLogLog commands no longer crash on certain input (non HLL) strings. - Fixed SLAVEOF inside MULTI/EXEC blocks. - TCP binding bug fixed when only certain addresses were available for a given por - MIGRATE could crash the server after a socket error |
last seen | 2020-06-05 |
modified | 2017-11-13 |
plugin id | 104521 |
published | 2017-11-13 |
reporter | This script is Copyright (C) 2017-2020 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/104521 |
title | openSUSE Security Update : redis (openSUSE-2017-1258) |
code |
|
References
- http://www.securityfocus.com/bid/101572
- http://www.securityfocus.com/bid/101572
- https://github.com/antirez/redis/commit/874804da0c014a7d704b3d285aa500098a931f50
- https://github.com/antirez/redis/commit/874804da0c014a7d704b3d285aa500098a931f50
- https://raw.githubusercontent.com/antirez/redis/3.2/00-RELEASENOTES
- https://raw.githubusercontent.com/antirez/redis/3.2/00-RELEASENOTES
- https://www.reddit.com/r/redis/comments/5r8wxn/redis_327_is_out_important_security_fixes_inside/
- https://www.reddit.com/r/redis/comments/5r8wxn/redis_327_is_out_important_security_fixes_inside/