Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2022-24834

Опубликовано: 10 июл. 2023
Источник: redhat
CVSS3: 7
EPSS Средний

Описание

Redis is an in-memory database that persists on disk. A specially crafted Lua script executing in Redis can trigger a heap overflow in the cjson library, and result with heap corruption and potentially remote code execution. The problem exists in all versions of Redis with Lua scripting support, starting from 2.6, and affects only authenticated and authorized users. The problem is fixed in versions 7.0.12, 6.2.13, and 6.0.20.

A heap-based buffer overflow flaw was found in Redis. This flaw allows a local authenticated attacker user or attacker to execute a specially crafted Lua script in Redis. This attack triggers a heap overflow in the cjson and cmsgpack libraries, resulting in heap corruption and potential remote code execution.

Отчет

The problem exists in all versions of Redis with Lua scripting support, starting from 2.6, and affects only authenticated and authorized users.

Меры по смягчению последствий

Prevent users from executing Lua scripts. This can be done using ACL to restrict EVAL and EVALSHA commands.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat 3scale API Management Platform 23scale-amp-backend-containerAffected
Red Hat 3scale API Management Platform 23scale-amp-system-containerWill not fix
Red Hat Advanced Cluster Management for Kubernetes 2rhacm2/search-api-rhel8Not affected
Red Hat Ansible Automation Platform 1.2ansible-towerNot affected
Red Hat Enterprise Linux 9redis-6-containerNot affected
Red Hat Fuse 7redisNot affected
Red Hat OpenStack Platform 16.1openstack-redis-base-containerNot affected
Red Hat OpenStack Platform 16.1openstack-redis-containerNot affected
Red Hat OpenStack Platform 16.2openstack-redis-containerNot affected
Red Hat OpenStack Platform 17.0openstack-redis-containerNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-680
https://bugzilla.redhat.com/show_bug.cgi?id=2221662redis: heap overflow in the lua cjson and cmsgpack libraries

EPSS

Процентиль: 96%
0.29967
Средний

7 High

CVSS3

Связанные уязвимости

CVSS3: 7
ubuntu
почти 2 года назад

Redis is an in-memory database that persists on disk. A specially crafted Lua script executing in Redis can trigger a heap overflow in the cjson library, and result with heap corruption and potentially remote code execution. The problem exists in all versions of Redis with Lua scripting support, starting from 2.6, and affects only authenticated and authorized users. The problem is fixed in versions 7.0.12, 6.2.13, and 6.0.20.

CVSS3: 7
nvd
почти 2 года назад

Redis is an in-memory database that persists on disk. A specially crafted Lua script executing in Redis can trigger a heap overflow in the cjson library, and result with heap corruption and potentially remote code execution. The problem exists in all versions of Redis with Lua scripting support, starting from 2.6, and affects only authenticated and authorized users. The problem is fixed in versions 7.0.12, 6.2.13, and 6.0.20.

CVSS3: 7
debian
почти 2 года назад

Redis is an in-memory database that persists on disk. A specially craf ...

suse-cvrf
почти 2 года назад

Security update for redis

CVSS3: 8.8
fstec
почти 2 года назад

Уязвимость библиотек cjson и cmsgpack системы управления базами данных (СУБД) Redis, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 96%
0.29967
Средний

7 High

CVSS3