PT-2022-2530 · Redis +8 · Redis +8
Published
2022-02-10
·
Updated
2025-07-11
·
CVE-2022-24735
6.8
Medium
Base vector | Vector | AV:N/AC:M/Au:N/C:P/I:P/A:P |
Name of the Vulnerable Software and Affected Versions:
Redis versions prior to 7.0.0 and 6.2.7
Description:
The issue is related to weaknesses in the Lua script execution environment in Redis, which can be exploited by a less privileged user to inject Lua code that will execute with potentially higher privileges of another Redis user. This is possible due to the introduction of ACLs in Redis 6.0. The Lua script execution environment provides measures to prevent side effects, but several weaknesses have been publicly known for a long time. These weaknesses can now be exploited to inject Lua code that will execute at a later time when a privileged user executes a Lua script.
Recommendations:
For Redis versions prior to 7.0.0, update to version 7.0.0 or later.
For Redis versions prior to 6.2.7, update to version 6.2.7 or later.
As a temporary workaround, if Lua scripting is not being used, consider blocking access to `SCRIPT LOAD` and `EVAL` commands using ACL rules.
Exploit
Fix
Code Injection
Special Elements Injection
Related Identifiers
Affected Products
References · 111
- 🔥 https://github.com/redis/redis/pull/10651⭐ 69924 🔗 24114 · Exploit
- https://safe-surf.ru/specialists/bulletins-nkcki/667377 · Security Note
- https://bdu.fstec.ru/vul/2021-00559 · Security Note
- https://nvd.nist.gov/vuln/detail/CVE-2022-24736 · Security Note
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/VPYKSG7LKUJGVM2P72EHXKVRVRWHLORX · Vendor Advisory
- https://security-tracker.debian.org/tracker/source-package/redis · Vendor Advisory
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32687 · Security Note
- https://bdu.fstec.ru/vul/2023-02181 · Security Note
- https://ubuntu.com/security/CVE-2022-24735 · Vendor Advisory
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32675 · Security Note
- https://safe-surf.ru/specialists/bulletins-nkcki/670009 · Security Note
- https://errata.almalinux.org/9/ALSA-2022-8096.html · Vendor Advisory
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32672 · Security Note
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32627 · Security Note
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41099 · Security Note