10 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
Redis before 2.8.21 and 3.x before 3.0.2 allows remote attackers to execute arbitrary Lua bytecode via the eval command.
Recent assessments:
hrbrmstr at June 08, 2020 6:38pm UTC reported:
Ben Murphy’s dissection — <https://benmmurphy.github.io/blog/2015/06/04/redis-eval-lua-sandbox-escape/> — is pretty thorough.
Assessed Attacker Value: 5
Assessed Attacker Value: 5Assessed Attacker Value: 5
benmmurphy.github.io/blog/2015/06/04/redis-eval-lua-sandbox-escape
lists.fedoraproject.org/pipermail/package-announce/2015-July/162094.html
lists.fedoraproject.org/pipermail/package-announce/2015-July/162146.html
lists.opensuse.org/opensuse-updates/2015-10/msg00014.html
rhn.redhat.com/errata/RHSA-2015-1676.html
www.debian.org/security/2015/dsa-3279
www.openwall.com/lists/oss-security/2015/06/04/12
www.openwall.com/lists/oss-security/2015/06/04/8
www.openwall.com/lists/oss-security/2015/06/05/3
www.securityfocus.com/bid/75034
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4335
github.com/antirez/redis/commit/fdf9d455098f54f7666c702ae464e6ea21e25411
groups.google.com/forum#!msg/redis-db/4Y6OqK8gEyk/Dg-5cejl-eUJ
security.gentoo.org/glsa/201702-16