DragonflyDB Dragonfly through 1.28.2 (fixed in 1.29.0) allows authenticated users to cause a denial of service (daemon crash) via a Lua library command that references a large negative integer.
The product subtracts one value from another, such that the result is less than the minimum allowable integer value, which produces a value that is not equal to the correct result.
Link | Tags |
---|---|
https://github.com/dragonflydb/dragonfly/issues/4468 | patch issue tracking exploit |
https://github.com/dragonflydb/dragonfly/commit/4612aec9a78e3f604e6fb19bee51acde89723308 | patch |
https://gist.github.com/ankki-zsyang/d8215cf6e868d07546eaa5346a884ebd | third party advisory exploit |