|
|||
Rule General Information |
---|
Release Date: | 2022-03-15 | |
Rule Name: | Redis Lua Sandbox Bypass Remote Command Execution Vulnerability (CVE-2022-0543) | |
Severity: | ||
CVE ID: | ||
Rule Protection Details |
---|
Description: | It was discovered, that redis, a persistent key-value database, due to a packaging issue, is prone to a (Debian-specific) Lua sandbox escape, which could result in remote code execution. | |
Impact: | An attacker can execute arbitrary command via a successful exploit in the context of the vulnerable software. | |
Affected OS: | Windows, Linux, Others | |
Reference: | https://bugs.debian.org/1005787 https://lists.debian.org/debian-security-announce/2022/msg00048.html https://www.debian.org/security/2022/dsa-5081 https://www.ubercomp.com/posts/2022-01-20_redis_on_debian_rce |
|
Solutions |
---|
The vendor has released upgrade patches to fix vulnerabilities, please visit: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1005787 |