Redis is an open source, in-memory database that persists on disk. An authenticated user may use a specially crafted Lua script to manipulate the garbage collector and potentially lead to remote code execution. The problem is fixed in 7.4.2, 7.2.7, and 6.2.17. An additional workaround to mitigate the problem without patching the redis-server executable is to prevent users from executing Lua scripts. This can be done using ACL to restrict EVAL and EVALSHA commands.
History

Thu, 09 Jan 2025 13:30:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Important


Mon, 06 Jan 2025 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 06 Jan 2025 21:30:00 +0000

Type Values Removed Values Added
Description Redis is an open source, in-memory database that persists on disk. An authenticated user may use a specially crafted Lua script to manipulate the garbage collector and potentially lead to remote code execution. The problem is fixed in 7.4.2, 7.2.7, and 6.2.17. An additional workaround to mitigate the problem without patching the redis-server executable is to prevent users from executing Lua scripts. This can be done using ACL to restrict EVAL and EVALSHA commands.
Title Redis' Lua library commands may lead to remote code execution
Weaknesses CWE-416
References
Metrics cvssV3_1

{'score': 7, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2025-01-06T21:11:51.687Z

Updated: 2025-01-06T21:42:29.135Z

Reserved: 2024-09-16T16:10:09.018Z

Link: CVE-2024-46981

cve-icon Vulnrichment

Updated: 2025-01-06T21:41:58.543Z

cve-icon NVD

Status : Received

Published: 2025-01-06T22:15:09.360

Modified: 2025-01-06T22:15:09.360

Link: CVE-2024-46981

cve-icon Redhat

Severity : Important

Publid Date: 2025-01-06T21:11:51Z

Links: CVE-2024-46981 - Bugzilla