CVE-2022-36021

Name
CVE-2022-36021
Description
Redis is an in-memory database that persists on disk. Authenticated users can use string matching commands (like `SCAN` or `KEYS`) with a specially crafted pattern to trigger a denial-of-service attack on Redis, causing it to hang and consume 100% CPU time. The problem is fixed in Redis versions 6.0.18, 6.2.11, 7.0.9.
NVD Severity
medium
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
MISC https://github.com/redis/redis/security/advisories/GHSA-jr7j-rfj5-8xqv
MISC https://github.com/redis/redis/commit/dcbfcb916ca1a269b3feef86ee86835294758f84

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:redis:redis:*:*:*:*:*:*:*:* redis >= 7.0.0 < 7.0.9
cpe:2.3:a:redis:redis:*:*:*:*:*:*:*:* redis >= 6.2.0 < 6.2.11
cpe:2.3:a:redis:redis:*:*:*:*:*:*:*:* redis >= None < 6.0.18

Vulnerable and fixed packages

Source package Branch Version Maintainer Status