7.8
CWE
94
Advisory Published
Updated

CVE-2022-24735: Lua scripts can be manipulated to overcome ACL rules in Redis

First published: Wed Apr 27 2022(Updated: )

Redis is an in-memory database that persists on disk. By exploiting weaknesses in the Lua script execution environment, an attacker with access to Redis prior to version 7.0.0 or 6.2.7 can inject Lua code that will execute with the (potentially higher) privileges of another Redis user. The Lua script execution environment in Redis provides some measures that prevent a script from creating side effects that persist and can affect the execution of the same, or different script, at a later time. Several weaknesses of these measures have been publicly known for a long time, but they had no security impact as the Redis security model did not endorse the concept of users or privileges. With the introduction of ACLs in Redis 6.0, these weaknesses can be exploited by a less privileged users to inject Lua code that will execute at a later time, when a privileged user executes a Lua script. The problem is fixed in Redis versions 7.0.0 and 6.2.7. An additional workaround to mitigate this problem without patching the redis-server executable, if Lua scripting is not being used, is to block access to `SCRIPT LOAD` and `EVAL` commands using ACL rules.

Credit: security-advisories@github.com

Affected SoftwareAffected VersionHow to fix
Redis<6.2.7
Redis=7.0-rc1
Redis=7.0-rc2
Redis=7.0-rc3
Fedora=34
Fedora=35
Fedora=36
netapp management services for element software
NetApp Management Services for NetApp HCI
Oracle Communications Operations Monitor=4.3
Oracle Communications Operations Monitor=4.4
Oracle Communications Operations Monitor=5.0

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is Redis?

    Redis is an in-memory database that persists on disk.

  • What version of Redis is affected by CVE-2022-24735?

    Redis versions prior to 7.0.0 or 6.2.7 are affected by CVE-2022-24735.

  • What is the severity of CVE-2022-24735?

    CVE-2022-24735 has a severity rating of 7.8 (high).

  • How can an attacker exploit CVE-2022-24735?

    By exploiting weaknesses in the Lua script execution environment, an attacker can inject Lua code that will execute with the (potentially higher) privileges of another Redis user.

  • How do I fix CVE-2022-24735?

    Upgrade Redis to version 7.0.0 or 6.2.7 to fix CVE-2022-24735.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203