DragonflyDB Dragonfly before 1.27.0 allows authenticated users to cause a denial of service (daemon crash) via a crafted Redis command. The validity of the scan cursor was not checked.
The product encounters an error but does not provide a status code or return value to indicate that an error has occurred.
Link | Tags |
---|---|
https://github.com/dragonflydb/dragonfly/issues/4466 | issue tracking exploit |
https://github.com/dragonflydb/dragonfly/commit/d1fac0f912edb323a2bdd6404c518cda21eac243 | patch |
https://github.com/dragonflydb/dragonfly/compare/v1.26.4...v1.27.0 | patch release notes |