Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-46981

Опубликовано: 06 янв. 2025
Источник: redhat
CVSS3: 7
EPSS Высокий

Описание

Redis is an open source, in-memory database that persists on disk. An authenticated user may use a specially crafted Lua script to manipulate the garbage collector and potentially lead to remote code execution. The problem is fixed in 7.4.2, 7.2.7, and 6.2.17. An additional workaround to mitigate the problem without patching the redis-server executable is to prevent users from executing Lua scripts. This can be done using ACL to restrict EVAL and EVALSHA commands.

A flaw was found in the Redis server. This flaw allows an authenticated user to use a specially crafted Lua script to manipulate the garbage collector, potentially leading to remote code execution.

Отчет

The problem exists in all versions of Redis with Lua scripting. This vulnerability in Redis is classified as high severity rather than moderate due to its potential impact and exploitation scope. By manipulating the Lua garbage collector through crafted scripts, an authenticated attacker can achieve remote code execution (RCE), allowing them to execute arbitrary commands on the host system. This compromises not only the integrity and confidentiality of the data stored in Redis but also the underlying server itself. Furthermore, the exploitation does not require direct access to the server binary, making it feasible for attackers to execute through legitimate, albeit malicious, commands.

Меры по смягчению последствий

A workaround to mitigate the problem without patching the redis-server executable is to prevent users from executing Lua scripts. This can be done using ACL to restrict EVAL and EVALSHA commands.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
OpenShift Lightspeedopenshift-lightspeed-tech-preview/lightspeed-service-api-rhel9Affected
Red Hat Ansible Automation Platform 1.2ansible-towerNot affected
Red Hat Enterprise Linux AI (RHEL AI)rhelai1/bootc-amd-rhel9Will not fix
Red Hat Enterprise Linux AI (RHEL AI)rhelai1/bootc-azure-amd-rhel9Will not fix
Red Hat Enterprise Linux AI (RHEL AI)rhelai1/instructlab-amd-rhel9Will not fix
Red Hat Fuse 7io.hawt-hawtio-integrationNot affected
Red Hat Quay 3quay/quay-rhel8Affected
Discovery 1 for RHEL 9discovery/discovery-server-rhel9FixedRHSA-2025:124910.02.2025
Discovery 1 for RHEL 9discovery/discovery-ui-rhel9FixedRHSA-2025:124910.02.2025
Red Hat Enterprise Linux 8redisFixedRHSA-2025:059522.01.2025

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-416
https://bugzilla.redhat.com/show_bug.cgi?id=2336004redis: Redis' Lua library commands may lead to remote code execution

EPSS

Процентиль: 99%
0.73555
Высокий

7 High

CVSS3

Связанные уязвимости

CVSS3: 7
ubuntu
6 месяцев назад

Redis is an open source, in-memory database that persists on disk. An authenticated user may use a specially crafted Lua script to manipulate the garbage collector and potentially lead to remote code execution. The problem is fixed in 7.4.2, 7.2.7, and 6.2.17. An additional workaround to mitigate the problem without patching the redis-server executable is to prevent users from executing Lua scripts. This can be done using ACL to restrict EVAL and EVALSHA commands.

CVSS3: 7
nvd
6 месяцев назад

Redis is an open source, in-memory database that persists on disk. An authenticated user may use a specially crafted Lua script to manipulate the garbage collector and potentially lead to remote code execution. The problem is fixed in 7.4.2, 7.2.7, and 6.2.17. An additional workaround to mitigate the problem without patching the redis-server executable is to prevent users from executing Lua scripts. This can be done using ACL to restrict EVAL and EVALSHA commands.

CVSS3: 7
msrc
5 месяцев назад

Описание отсутствует

CVSS3: 7
debian
6 месяцев назад

Redis is an open source, in-memory database that persists on disk. An ...

suse-cvrf
5 месяцев назад

Security update for redis

EPSS

Процентиль: 99%
0.73555
Высокий

7 High

CVSS3