CVE-2023-45145
Redis Unix-domain socket may have be exposed with the wrong permissions for a short time window.
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Redis is an in-memory database that persists on disk. On startup, Redis begins listening on a Unix socket before adjusting its permissions to the user-provided configuration. If a permissive umask(2) is used, this creates a race condition that enables, during a short period of time, another process to establish an otherwise unauthorized connection. This problem has existed since Redis 2.6.0-RC1. This issue has been addressed in Redis versions 7.2.2, 7.0.14 and 6.2.14. Users are advised to upgrade. For users unable to upgrade, it is possible to work around the problem by disabling Unix sockets, starting Redis with a restrictive umask, or storing the Unix socket file in a protected directory.
Redis es una base de datos en memoria que persiste en el disco. Al iniciarse, Redis comienza a escuchar en un socket Unix antes de ajustar sus permisos a la configuración proporcionada por el usuario. Si se utiliza una umask(2) permisiva, esto crea una condición de ejecución que permite, durante un corto período de tiempo, que otro proceso establezca una conexión que de otro modo no estaría autorizada. Este problema existe desde Redis 2.6.0-RC1. Este problema se solucionó en las versiones 7.2.2, 7.0.14 y 6.2.14 de Redis. Se recomienda a los usuarios que actualicen. Para los usuarios que no pueden actualizar, es posible workaround el problema deshabilitando los sockets Unix, iniciando Redis con una máscara de usuario restrictiva o almacenando el archivo del socket Unix en un directorio protegido.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2023-10-04 CVE Reserved
- 2023-10-18 CVE Published
- 2023-11-04 EPSS Updated
- 2024-08-02 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-668: Exposure of Resource to Wrong Sphere
CAPEC
References (7)
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://github.com/redis/redis/commit/03345ddc7faf7af079485f2cbe5d17a1611cbce1 | 2024-01-21 |
URL | Date | SRC |
---|---|---|
https://github.com/redis/redis/security/advisories/GHSA-ghmp-889m-7cvx | 2024-01-21 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Redis Search vendor "Redis" | Redis Search vendor "Redis" for product "Redis" | >= 2.6.0 < 6.2.14 Search vendor "Redis" for product "Redis" and version " >= 2.6.0 < 6.2.14" | - |
Affected
| ||||||
Redis Search vendor "Redis" | Redis Search vendor "Redis" for product "Redis" | >= 7.0.0 < 7.0.14 Search vendor "Redis" for product "Redis" and version " >= 7.0.0 < 7.0.14" | - |
Affected
| ||||||
Redis Search vendor "Redis" | Redis Search vendor "Redis" for product "Redis" | >= 7.2.0 < 7.2.2 Search vendor "Redis" for product "Redis" and version " >= 7.2.0 < 7.2.2" | - |
Affected
| ||||||
Redis Search vendor "Redis" | Redis Search vendor "Redis" for product "Redis" | 2.6.0 Search vendor "Redis" for product "Redis" and version "2.6.0" | rc1 |
Affected
| ||||||
Fedoraproject Search vendor "Fedoraproject" | Fedora Search vendor "Fedoraproject" for product "Fedora" | 37 Search vendor "Fedoraproject" for product "Fedora" and version "37" | - |
Affected
| ||||||
Fedoraproject Search vendor "Fedoraproject" | Fedora Search vendor "Fedoraproject" for product "Fedora" | 38 Search vendor "Fedoraproject" for product "Fedora" and version "38" | - |
Affected
| ||||||
Fedoraproject Search vendor "Fedoraproject" | Fedora Search vendor "Fedoraproject" for product "Fedora" | 39 Search vendor "Fedoraproject" for product "Fedora" and version "39" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 10.0 Search vendor "Debian" for product "Debian Linux" and version "10.0" | - |
Affected
|