Description
RediSearch is a Redis module that provides querying, secondary indexing, and full-text search for Redis. An authenticated redis user executing FT.SEARCH or FT.AGGREGATE with a specially crafted LIMIT command argument, or FT.SEARCH with a specially crafted KNN command argument, can trigger an integer overflow, leading to heap overflow and potential remote code execution. This vulnerability is fixed in 2.6.24, 2.8.21, and 2.10.10. Avoid setting value of -1 or large values for configuration parameters MAXSEARCHRESULTS and MAXAGGREGATERESULTS, to avoid exploiting large LIMIT arguments.
Problem types
CWE-122: Heap-based Buffer Overflow
CWE-190: Integer Overflow or Wraparound
Product status
>= 2.8.0, < 2.8.21
>= 2.10.0, < 2.10.10
References
github.com/...Search/security/advisories/GHSA-p2pg-67m3-4c76
github.com/...ommit/13a2936d921dbe5a2e3c72653e0bd7b26af3a6cb