Skip to content

Kredis JSON Possible Deserialization of Untrusted Data Vulnerability

Moderate severity GitHub Reviewed Published Jun 9, 2023 to the GitHub Advisory Database • Updated Jun 9, 2023

Package

bundler kredis (RubyGems)

Affected versions

< 1.3.0.1

Patched versions

1.3.0.1

Description

There is a deserialization of untrusted data vulnerability in
the Kredis JSON deserialization code. This vulnerability has
been assigned the CVE identifier CVE-2023-27531.

'Not affected: None.'
'Versions Affected: All.'
'Fixed Versions: 1.3.0.1'

Impact
Carefully crafted JSON data processed by Kredis may result in
deserialization of untrusted data, potentially leading to
deserialization of unexpected objects in the system.

Any applications using Kredis with JSON are affected.

Releases
The fixed releases are available at the normal locations.

Workarounds
There are no feasible workarounds for this issue.

Patches
To aid users who aren’t able to upgrade immediately we have
provided patches for the two supported release series. They
are in git-am format and consist of a single changeset.

  • 1-3-0-1-kredis.patch - Patch for 1.3.0 series

Credits
Thank you ooooooo_k 7 for reporting this!

References

Published to the GitHub Advisory Database Jun 9, 2023
Reviewed Jun 9, 2023
Last updated Jun 9, 2023

Severity

Moderate

Weaknesses

CVE ID

CVE-2023-27531

GHSA ID

GHSA-h2wm-p2vg-6pw4

Source code

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.