Vulnerabilities > CVE-2023-28858 - Off-by-one Error vulnerability in Redis Redis-Py
Attack vector
NETWORK Attack complexity
HIGH Privileges required
NONE Confidentiality impact
LOW Integrity impact
NONE Availability impact
NONE Summary
redis-py before 4.5.3 leaves a connection open after canceling an async Redis command at an inopportune time, and can send response data to the client of an unrelated request in an off-by-one manner. NOTE: this CVE Record was initially created in response to reports about ChatGPT, and 4.3.6, 4.4.3, and 4.5.3 were released (changing the behavior for pipeline operations); however, please see CVE-2023-28859 about addressing data leakage across AsyncIO connections in general.
Vulnerable Configurations
Common Weakness Enumeration (CWE)
References
- https://github.com/redis/redis-py/compare/v4.3.5...v4.3.6
- https://github.com/redis/redis-py/compare/v4.4.2...v4.4.3
- https://github.com/redis/redis-py/compare/v4.5.2...v4.5.3
- https://github.com/redis/redis-py/issues/2624
- https://github.com/redis/redis-py/pull/2641
- https://openai.com/blog/march-20-chatgpt-outage
- https://github.com/redis/redis-py/compare/v4.3.5...v4.3.6
- https://openai.com/blog/march-20-chatgpt-outage
- https://github.com/redis/redis-py/pull/2641
- https://github.com/redis/redis-py/issues/2624
- https://github.com/redis/redis-py/compare/v4.5.2...v4.5.3
- https://github.com/redis/redis-py/compare/v4.4.2...v4.4.3