CVE-2023-47004

Buffer Overflow vulnerability in Redis RedisGraph v.2.x through v.2.12.8 and fixed in v.2.12.9 allows an attacker to execute arbitrary code via the code logic after valid authentication.
References
Link Resource
https://github.com/RedisGraph/RedisGraph/issues/3178 Exploit Issue Tracking Vendor Advisory
https://github.com/RedisGraph/RedisGraph/issues/3178 Exploit Issue Tracking Vendor Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:redislabs:redisgraph:*:*:*:*:*:*:*:*

History

29 Apr 2025, 20:15

Type Values Removed Values Added
CWE CWE-120

21 Nov 2024, 08:29

Type Values Removed Values Added
References () https://github.com/RedisGraph/RedisGraph/issues/3178 - Exploit, Issue Tracking, Vendor Advisory () https://github.com/RedisGraph/RedisGraph/issues/3178 - Exploit, Issue Tracking, Vendor Advisory

16 Nov 2023, 17:36

Type Values Removed Values Added
CPE cpe:2.3:a:redislabs:redisgraph:*:*:*:*:*:*:*:*
First Time Redislabs redisgraph
Redislabs
References (MISC) https://github.com/RedisGraph/RedisGraph/issues/3178 - (MISC) https://github.com/RedisGraph/RedisGraph/issues/3178 - Exploit, Issue Tracking, Vendor Advisory
CWE CWE-787
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.8

06 Nov 2023, 22:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-11-06 22:15

Updated : 2025-04-29 20:15


NVD link : CVE-2023-47004

Mitre link : CVE-2023-47004

CVE.ORG link : CVE-2023-47004


JSON object : View

Products Affected

redislabs

  • redisgraph
CWE
CWE-787

Out-of-bounds Write

CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')