Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2023-28858

Summary
Assigner-mitre
Assigner Org ID-8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At-26 Mar, 2023 | 00:00
Updated At-20 Feb, 2025 | 15:35
Rejected At-
Credits

redis-py before 4.5.3 leaves a connection open after canceling an async Redis command at an inopportune time, and can send response data to the client of an unrelated request in an off-by-one manner. NOTE: this CVE Record was initially created in response to reports about ChatGPT, and 4.3.6, 4.4.3, and 4.5.3 were released (changing the behavior for pipeline operations); however, please see CVE-2023-28859 about addressing data leakage across AsyncIO connections in general.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:mitre
Assigner Org ID:8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At:26 Mar, 2023 | 00:00
Updated At:20 Feb, 2025 | 15:35
Rejected At:
▼CVE Numbering Authority (CNA)

redis-py before 4.5.3 leaves a connection open after canceling an async Redis command at an inopportune time, and can send response data to the client of an unrelated request in an off-by-one manner. NOTE: this CVE Record was initially created in response to reports about ChatGPT, and 4.3.6, 4.4.3, and 4.5.3 were released (changing the behavior for pipeline operations); however, please see CVE-2023-28859 about addressing data leakage across AsyncIO connections in general.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://github.com/redis/redis-py/pull/2641
N/A
https://github.com/redis/redis-py/issues/2624
N/A
https://github.com/redis/redis-py/compare/v4.5.2...v4.5.3
N/A
https://github.com/redis/redis-py/compare/v4.4.2...v4.4.3
N/A
https://github.com/redis/redis-py/compare/v4.3.5...v4.3.6
N/A
https://openai.com/blog/march-20-chatgpt-outage
N/A
Hyperlink: https://github.com/redis/redis-py/pull/2641
Resource: N/A
Hyperlink: https://github.com/redis/redis-py/issues/2624
Resource: N/A
Hyperlink: https://github.com/redis/redis-py/compare/v4.5.2...v4.5.3
Resource: N/A
Hyperlink: https://github.com/redis/redis-py/compare/v4.4.2...v4.4.3
Resource: N/A
Hyperlink: https://github.com/redis/redis-py/compare/v4.3.5...v4.3.6
Resource: N/A
Hyperlink: https://openai.com/blog/march-20-chatgpt-outage
Resource: N/A
▼Authorized Data Publishers (ADP)
1. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://github.com/redis/redis-py/pull/2641
x_transferred
https://github.com/redis/redis-py/issues/2624
x_transferred
https://github.com/redis/redis-py/compare/v4.5.2...v4.5.3
x_transferred
https://github.com/redis/redis-py/compare/v4.4.2...v4.4.3
x_transferred
https://github.com/redis/redis-py/compare/v4.3.5...v4.3.6
x_transferred
https://openai.com/blog/march-20-chatgpt-outage
x_transferred
Hyperlink: https://github.com/redis/redis-py/pull/2641
Resource:
x_transferred
Hyperlink: https://github.com/redis/redis-py/issues/2624
Resource:
x_transferred
Hyperlink: https://github.com/redis/redis-py/compare/v4.5.2...v4.5.3
Resource:
x_transferred
Hyperlink: https://github.com/redis/redis-py/compare/v4.4.2...v4.4.3
Resource:
x_transferred
Hyperlink: https://github.com/redis/redis-py/compare/v4.3.5...v4.3.6
Resource:
x_transferred
Hyperlink: https://openai.com/blog/march-20-chatgpt-outage
Resource:
x_transferred
2. CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:cve@mitre.org
Published At:26 Mar, 2023 | 19:15
Updated At:17 May, 2023 | 17:07

redis-py before 4.5.3 leaves a connection open after canceling an async Redis command at an inopportune time, and can send response data to the client of an unrelated request in an off-by-one manner. NOTE: this CVE Record was initially created in response to reports about ChatGPT, and 4.3.6, 4.4.3, and 4.5.3 were released (changing the behavior for pipeline operations); however, please see CVE-2023-28859 about addressing data leakage across AsyncIO connections in general.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.13.7LOW
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
Type: Primary
Version: 3.1
Base score: 3.7
Base severity: LOW
Vector:
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
CPE Matches

Redis Inc.
redis
>>redis-py>>Versions from 4.2.0(inclusive) to 4.3.6(exclusive)
cpe:2.3:a:redis:redis-py:*:*:*:*:*:*:*:*
Redis Inc.
redis
>>redis-py>>Versions from 4.4.0(inclusive) to 4.4.3(exclusive)
cpe:2.3:a:redis:redis-py:*:*:*:*:*:*:*:*
Redis Inc.
redis
>>redis-py>>Versions from 4.5.0(inclusive) to 4.5.3(exclusive)
cpe:2.3:a:redis:redis-py:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-193Primarynvd@nist.gov
CWE ID: CWE-193
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://github.com/redis/redis-py/compare/v4.3.5...v4.3.6cve@mitre.org
Patch
https://github.com/redis/redis-py/compare/v4.4.2...v4.4.3cve@mitre.org
Patch
https://github.com/redis/redis-py/compare/v4.5.2...v4.5.3cve@mitre.org
Patch
https://github.com/redis/redis-py/issues/2624cve@mitre.org
Issue Tracking
https://github.com/redis/redis-py/pull/2641cve@mitre.org
Issue Tracking
Patch
https://openai.com/blog/march-20-chatgpt-outagecve@mitre.org
Third Party Advisory
Hyperlink: https://github.com/redis/redis-py/compare/v4.3.5...v4.3.6
Source: cve@mitre.org
Resource:
Patch
Hyperlink: https://github.com/redis/redis-py/compare/v4.4.2...v4.4.3
Source: cve@mitre.org
Resource:
Patch
Hyperlink: https://github.com/redis/redis-py/compare/v4.5.2...v4.5.3
Source: cve@mitre.org
Resource:
Patch
Hyperlink: https://github.com/redis/redis-py/issues/2624
Source: cve@mitre.org
Resource:
Issue Tracking
Hyperlink: https://github.com/redis/redis-py/pull/2641
Source: cve@mitre.org
Resource:
Issue Tracking
Patch
Hyperlink: https://openai.com/blog/march-20-chatgpt-outage
Source: cve@mitre.org
Resource:
Third Party Advisory

Change History

0
Information is not available yet

Similar CVEs

1Records found

CVE-2025-53014
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-3.7||LOW
EPSS-0.06% / 18.66%
||
7 Day CHG+0.02%
Published-14 Jul, 2025 | 17:59
Updated-26 Aug, 2025 | 17:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
ImageMagick has Heap Buffer Overflow in InterpretImageFilename

ImageMagick is free and open-source software used for editing and manipulating digital images. Versions prior to 7.1.2-0 and 6.9.13-26 have a heap buffer overflow in the `InterpretImageFilename` function. The issue stems from an off-by-one error that causes out-of-bounds memory access when processing format strings containing consecutive percent signs (`%%`). Versions 7.1.2-0 and 6.9.13-26 fix the issue.

Action-Not Available
Vendor-ImageMagick Studio LLC
Product-imagemagickImageMagick
CWE ID-CWE-125
Out-of-bounds Read
CWE ID-CWE-193
Off-by-one Error
Details not found