Lucene search

K
attackerkbAttackerKBAKB:BA8FC1DC-21F7-48C7-B5F4-2B2EB96E2BEC
HistoryJun 09, 2015 - 12:00 a.m.

CVE-2015-4335 — Redis EVAL Lua Sandbox Escape

2015-06-0900:00:00
attackerkb.com
19

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

Redis before 2.8.21 and 3.x before 3.0.2 allows remote attackers to execute arbitrary Lua bytecode via the eval command.

Recent assessments:

hrbrmstr at June 08, 2020 6:38pm UTC reported:

Ben Murphy’s dissection — <https://benmmurphy.github.io/blog/2015/06/04/redis-eval-lua-sandbox-escape/&gt; — is pretty thorough.

Assessed Attacker Value: 5
Assessed Attacker Value: 5Assessed Attacker Value: 5

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C