First published: Mon Jan 06 2025(Updated: )
Redis is an open source, in-memory database that persists on disk. An authenticated user may use a specially crafted Lua script to manipulate the garbage collector and potentially lead to remote code execution. The problem is fixed in 7.4.2, 7.2.7, and 6.2.17. An additional workaround to mitigate the problem without patching the redis-server executable is to prevent users from executing Lua scripts. This can be done using ACL to restrict EVAL and EVALSHA commands.
Affected Software | Affected Version | How to fix |
---|---|---|
ioredis | <7.4.2<7.2.7<6.2.17 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2336004 is critical due to the potential for remote code execution.
To fix REDHAT-BUG-2336004, upgrade to Redis versions 7.4.2, 7.2.7, or 6.2.17.
REDHAT-BUG-2336004 is caused by an authenticated user exploiting a specially crafted Lua script to manipulate the garbage collector.
Any organization using vulnerable versions of Redis is affected by REDHAT-BUG-2336004.
Yes, there is a workaround available to mitigate the risks associated with REDHAT-BUG-2336004 before upgrading.